diff --git a/htdocs/main.inc.php b/htdocs/main.inc.php index 890110cda8b65e8e57168ca99ba64c9bbb593f8b..9bb4e9aacdf0a654c6ec52fdab75199e78247e76 100644 --- a/htdocs/main.inc.php +++ b/htdocs/main.inc.php @@ -88,6 +88,7 @@ function test_sql_and_script_inject($val, $type) $sql_inj += preg_match('/union.+select/i', $val); $sql_inj += preg_match('/into\s+(outfile|dumpfile)/i', $val); $sql_inj += preg_match('/(\.\.%2f)+/i', $val); + $sql_inj += preg_match('/onerror=/i', $val); } // For XSS Injection done by adding javascript with script // This is all cases a browser consider text is javascript: @@ -96,7 +97,7 @@ function test_sql_and_script_inject($val, $type) $sql_inj += preg_match('/<script/i', $val); if (! defined('NOSTYLECHECK')) $sql_inj += preg_match('/<style/i', $val); $sql_inj += preg_match('/base[\s]+href/si', $val); - $sql_inj += preg_match('/<.*onmouseover/si', $val); // onmouseover can be set on img or any html tag like <img title='>' onmouseover=alert(1)> + $sql_inj += preg_match('/<.*onmouse/si', $val); // onmouseover can be set on img or any html tag like <img title='>' onmouseover=alert(1)> if ($type == 1) { $sql_inj += preg_match('/javascript:/i', $val);