19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

726 Chapter 19 n Finding Vulnerabilities in Source Code<br />

Table 19-7 (continued)<br />

VARIABLE<br />

$_SERVER[‘HTTP_REFERER’]<br />

$_SERVER[‘HTTP_USER_AGENT’]<br />

$_SERVER[‘PHP_SELF’]<br />

DESCRIPTION<br />

Contains <strong>the</strong> contents of <strong>the</strong> HTTP<br />

Referer header.<br />

Contains <strong>the</strong> contents of <strong>the</strong> HTTP<br />

User-agent header.<br />

Contains <strong>the</strong> name of <strong>the</strong> currently executing<br />

script. Although <strong>the</strong> script name<br />

itself is outside an attacker’s control,<br />

path information can be appended to<br />

this name. For example, if a script contains<br />

<strong>the</strong> following code:<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!