Forum Discussion
MichaelGraham2
9 years agoQrew Assistant Captain
I create a form for everyone on the internet and then cloak it with my host company
e.g. qbcontact.mickgraham.net goes straight into a contact app
This is my contact button on my website.
Its quite easy to do with eveyone on internet, a new form for contacts is all you would need.
e.g. qbcontact.mickgraham.net goes straight into a contact app
This is my contact button on my website.
Its quite easy to do with eveyone on internet, a new form for contacts is all you would need.
- _anomDiebolt_9 years agoQrew EliteI assume you are in a testing mode as you are leaking contacts:
https://iglcloud.quickbase.com/db/bmn4gfynv
Also, you success page being hosted in your application could leak other dbpages through enumeration:
https://iglcloud.quickbase.com/db/bmn4gfyqi?a=dbpage&pageid=6
https://iglcloud.quickbase.com/db/bmn4gfyqi?a=dbpage&pageid=7
https://iglcloud.quickbase.com/db/bmn4gfyqi?a=dbpage&pageid=8
https://iglcloud.quickbase.com/db/bmn4gfyqi?a=dbpage&pageid=9 - MichaelGraham29 years agoQrew Assistant CaptainI was actually just testing something and changed the internet role temporarily from Viewer to Participant. :)
How can I get round the pageid security. Other than link it to a webpage? - MCFNeil9 years agoQrew CaptainThere is not a good way, other than restricting a field access to a field that is on the reports on the dashboards, but open to the internet can also see all your code pages.
- _anomDiebolt_9 years agoQrew ElitePerhaps use a second application to host the success page but have nothing else in that application? I would have to test if you can still reach the pages of the application hosting the form. QuickBase's permissions is not all that fine grained where you can control every possible type of access.
On the other hand someone would have to have deep knowledge of QB to exploit this - most hackers just go for the low hanging fruit trying to exploit unpatched wordpress, drupal etc sites.