Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      How To Prevent WordPress SQL Injection Attacks

      June 11, 2025

      Creating The “Moving Highlight” Navigation Bar With JavaScript And CSS

      June 11, 2025

      Databricks adds new tools like Lakebase, Lakeflow Designer, and Agent Bricks to better support building AI apps and agents in the enterprise

      June 11, 2025

      Zencoder launches end-to-end UI testing agent

      June 11, 2025

      OpenAI CEO Sam Altman claims “ChatGPT is already more powerful than any human who has ever lived”

      June 11, 2025

      Apple Intelligence delay: A clash of two architectures and trivial AI features fell short of standards and expectations

      June 11, 2025

      Ambrosia Sky is a gorgeous science-fiction game that’s all about death, and I can’t wait to play more

      June 11, 2025

      3 secrets of PowerToys on Windows 11 that you’ll wish you already knew

      June 11, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      [EcjoJS Meta] Content discussion

      June 11, 2025
      Recent

      [EcjoJS Meta] Content discussion

      June 11, 2025

      Accessibility, Inclusive Design, and Universal Design Work Together

      June 11, 2025

      An “Inconceivable” Conversation With Dr. Pete Cornwell on Simple vs. Agentic AI

      June 11, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      OpenAI CEO Sam Altman claims “ChatGPT is already more powerful than any human who has ever lived”

      June 11, 2025
      Recent

      OpenAI CEO Sam Altman claims “ChatGPT is already more powerful than any human who has ever lived”

      June 11, 2025

      Apple Intelligence delay: A clash of two architectures and trivial AI features fell short of standards and expectations

      June 11, 2025

      Ambrosia Sky is a gorgeous science-fiction game that’s all about death, and I can’t wait to play more

      June 11, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»CodeSOD: The Pirate’s Code

    CodeSOD: The Pirate’s Code

    June 10, 2025

    We’ve talked about ASP .Net WebForms in the past. In this style of development, everything was event driven: click a button, and the browser sends an HTTP request to the server which triggers a series of events, including a “Button Click” event, and renders a new page.

    When ASP .Net launched, one of the “features” was a lazy repaint in browsers which supported it (aka, Internet Explorer), where you’d click the button, the page would render on the server, download, and then the browser would repaint only the changed areas, making it feel more like a desktop application, albeit a laggy one.

    This model didn’t translate super naturally to AJAX style calls, where JavaScript updated only portions of the page. The .Net team added some hooks for it- special “AJAX enabled” controls, as well as helper functions, like __doPostBack, in the UI to generate URLs for “postbacks” to trigger server side execution. A postback is just a POST request with .NET specific state data in the body.

    All this said, Chris maintains a booking system for a boat rental company. Specifically, he’s a developer at a company which the boat rental company hires to maintain their site. The original developer left behind a barnacle covered mess of tangled lines and rotting hull.

    Let’s start with the view ASPX definition:

    <script>
    function btnSave_Click()
    {
        if (someCondition) 
        {
        //Trimmed for your own sanity
        
        //PostBack to Save Data into the Database.
            javascript:<%#getPostBack()%>;                   
        }
        else
        {
            return false;
        }
    }
    </script>
    <html>
          <body>
              <input type="button" value="  Save  Booking  " id="btnSave" class="button" title="Save [Alt]" onclick="btnSave_Click()" />
          </body>
    </html>
    

    __doPostBack is the .NET method for generating URLs for performing postbacks, and specifically, it populates two request fields: __EVENTTARGET (the ID of the UI element triggering the event) and __EVENTARGUMENT, an arbitrary field for your use. I assume getPostBack() is a helper method which calls that. The code in btnSave_Click is as submitted, and I think our submitter may have mangled it a bit in “trimming”, but I can see the goal is to ensure than when the onclick event fires, we perform a “postback” operation with some hard-coded values for __EVENTTARGET and __EVENTELEMENT.

    Or maybe it isn’t mangled, and this code just doesn’t work?

    I enjoy that the tool-tip “title” field specifies that it’s “[Alt]” text, and that the name of the button includes extra whitespace to ensure that it’s padded out to a good rendering size, instead of using CSS.

    But we can skip past this into the real meat. How this gets handled on the server side:

    Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs) Handles Me.Load
        '// Trimmed more garbage
        If Page.IsPostBack Then
            'Check if save button has been Clicked.
            Dim eventArg As String = Request("__EVENTARGUMENT")
            Dim offset As Integer = eventArg.IndexOf("@@@@@")
            If (offset > -1) Then
                'this is an event that we raised. so do whatever you need to here.
                Save()
            End If
        End If
    End Sub
    

    From this, I conclude that getPostBack populates the __EVENTARGUMENT field with a pile of “@”, and we use that to recognize that the save button was clicked. Except, and this is the important thing, if they populated the ID property with btnSave, then ASP .Net would automatically call btnSave_Click. The entire point of the __doPostBack functionality is that it hooks into the event handling pattern and acts just like any other postback, but lets you have JavaScript execute as part of sending the request.

    The entire application is a boat with multiple holes in it; it’s taking on water and going down, and like a good captain, Chris is absolutely not going down with it and looking for a lifeboat.

    Chris writes:

    The thing in its entirety is probably one of the biggest WTFs I’ve ever had to work with.
    I’ve held off submitting because nothing was ever straight forward enough to be understood without posting the entire website.

    Honestly, I’m still not sure I understand it, but I do hate it.

    [Advertisement]
    BuildMaster allows you to create a self-service release management platform that allows different teams to manage their applications. Explore how!

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-48757: Lovable’s Row-Level Security Breakdown Exposes Sensitive Data Across Hundreds of Projects
    Next Article Setting Up Terraform: Installation and Configuration

    Related Posts

    News & Updates

    OpenAI CEO Sam Altman claims “ChatGPT is already more powerful than any human who has ever lived”

    June 11, 2025
    News & Updates

    Apple Intelligence delay: A clash of two architectures and trivial AI features fell short of standards and expectations

    June 11, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Dull Desktop? Install ‘Picture of the Day’ App on Ubuntu

    Linux

    “Ad blockers are not allowed”: Google escalates its battle against ad-blockers to push YouTube Premium’s $14/month subscriptions

    News & Updates

    See-Through Parallel Universes with Your Mind’s Eye – The Course Guidebook: Chapter 10

    Artificial Intelligence

    CVE-2025-3623 – WordPress Uncanny Automator PHP Object Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-43961 – Fujifilm LibRaw Out-of-Bounds Read Vulnerability

    April 20, 2025

    CVE ID : CVE-2025-43961

    Published : April 21, 2025, 12:15 a.m. | 2 hours ago

    Description : In LibRaw before 0.21.4, metadata/tiff.cpp has an out-of-bounds read in the Fujifilm 0xf00c tag parser.

    Severity: 2.9 | LOW

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-5364 – Campcodes Online Hospital Management System SQL Injection

    May 30, 2025

    CVE-2025-48414 – Apache Web Interface Unauthenticated Script Execution Vulnerability

    May 21, 2025

    CVE-2025-4794 – PHPGurukul Online Course Registration SQL Injection Vulnerability

    May 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.