Thats where I started. I was doing it via java script so I could ask the
user if they really wanted to delete. But when I passed the function the
encrypted value it did not like it for some reason. It was rendered all
funny. The function looks like this
<script language="JavaScript">
 function check(entry){
  if (confirm("This will delete this entry. Proceed?")){
   document.location = "foo.cfm?entry=" + entry;
   }
  else{}
 }
</script>
Then I would call it with
<a href="javascript:check(#Encrypt(primaryKey, 'notTheRealKey')#">Delete</a>
Which in turn comes out as
<a href="javascript:check("(%WE">Delete</a>
Totally breaks my code.
A.

----- Original Message -----
From: "Bruce Dunwiddie" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, August 12, 2003 11:57 AM
Subject: RE: [KCFusion] security question


> Well the checking in the database to make sure that the user is allowed to
> delete that record is a good step to leave in. As for the rest, I'd
probably
> recommend passing an encrypted value of the record to delete along with
the
> record id itself, so you can verify that they haven't just changed the id,
> and it won't matter if they can get access to the hidden encrypted value
> because they won't be able to submit the proper encrypted version to pass
> the validation.
>
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> Behalf Of Kory Bakken
> Sent: Tuesday, August 12, 2003 9:54 AM
> To: [EMAIL PROTECTED]
> Subject: RE: [KCFusion] security question
>
>
> Adaryl:
>
> Yes, if a person has IEBoster (http:// www.paessler.com/IEB
> <http://www.paessler.com/IEB> )  running on their machine, hidden form
> fields are just a right-click away.  You'd be better off putting a
"ACTIVE"
> field in any table that you are going to allow users to delete from.  That
> could inactivate the record, then you could manually review the deletes
> before committing any of them.  That's my 2 cents.
>
> Kory
>
> -----Original Message-----
> From: Adaryl Wakefield [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, August 12, 2003 10:48 AM
> To: [EMAIL PROTECTED]
> Subject: Re: [KCFusion] security question
>
>
> Im sorry I was in a hurry and should have explained this better. For the
> first time I am faced with allowing users to delete info from a database.
I
> am trying to come up with a save method for doing that. In other words I
> don't want people to just type random numbers in a query string and start
> erasing stuff. Most of the measures I have come up with so far are easily
> defeated. I had considered putting the primary key of the tuple to be
> deleted in a hidden form field but if you can alter the info sent in a
post
> request (and I think I read somewhere that you could) then that measure is
> kinda lame too. the best I've got so far is that the user can only delete
> those tuples that are related to their login.
> A.
>
> ----- Original Message -----
> From: Bruce Dunwiddie <mailto:[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>
> Sent: Tuesday, August 12, 2003 11:33 AM
> Subject: RE: [KCFusion] security question
>
> I don't know of a way to say make IE send different request headers, but
if
> you're trying to test something, wouldn't cfpost work?
>
> -----Original Message-----
> From: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>  [
> mailto:[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> ]On
> Behalf Of Adaryl Wakefield
> Sent: Monday, August 11, 2003 1:44 PM
> To: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>
> Subject: [KCFusion] security question
>
>
> Is is possible to alter the information that is sent in the headers of a
> POST request?
> A.
>
>
 
 
______________________________________________________________________
The KCFusion.org list and website is hosted by Humankind Systems, Inc.
List Archives........ http://www.mail-archive.com/[EMAIL PROTECTED]
Questions, Comments or Glowing Praise.. mailto:[EMAIL PROTECTED]
To Subscribe.................... mailto:[EMAIL PROTECTED]
To Unsubscribe................ mailto:[EMAIL PROTECTED]
 

Reply via email to