Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      How To Prevent WordPress SQL Injection Attacks

      June 12, 2025

      Java never goes out of style: Celebrating 30 years of the language

      June 12, 2025

      OpenAI o3-pro available in the API, BrowserStack adds Playwright support for real iOS devices, and more – Daily News Digest

      June 12, 2025

      Creating The “Moving Highlight” Navigation Bar With JavaScript And CSS

      June 11, 2025

      Surface Pro 11 with Snapdragon X Elite drops to lowest price ever

      June 12, 2025

      With WH40K Boltgun and Dungeons of Hinterberg, this month’s Humble Choice lineup is stacked for less than $12

      June 12, 2025

      I’ve been loving the upgrade to my favorite mobile controller, and there’s even a version for large tablets

      June 12, 2025

      Copilot Vision just launched — and Microsoft already added new features

      June 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Master Data Management: The Key to Improved Analytics Reporting

      June 12, 2025
      Recent

      Master Data Management: The Key to Improved Analytics Reporting

      June 12, 2025

      Salesforce Lead-to-Revenue Management

      June 12, 2025

      React Native 0.80 – React 19.1, JS API Changes, Freezing Legacy Arch and much more

      June 12, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Surface Pro 11 with Snapdragon X Elite drops to lowest price ever

      June 12, 2025
      Recent

      Surface Pro 11 with Snapdragon X Elite drops to lowest price ever

      June 12, 2025

      With WH40K Boltgun and Dungeons of Hinterberg, this month’s Humble Choice lineup is stacked for less than $12

      June 12, 2025

      I’ve been loving the upgrade to my favorite mobile controller, and there’s even a version for large tablets

      June 12, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»CodeSOD: The Pirate’s Code

    CodeSOD: The Pirate’s Code

    June 10, 2025

    We’ve talked about ASP .Net WebForms in the past. In this style of development, everything was event driven: click a button, and the browser sends an HTTP request to the server which triggers a series of events, including a “Button Click” event, and renders a new page.

    When ASP .Net launched, one of the “features” was a lazy repaint in browsers which supported it (aka, Internet Explorer), where you’d click the button, the page would render on the server, download, and then the browser would repaint only the changed areas, making it feel more like a desktop application, albeit a laggy one.

    This model didn’t translate super naturally to AJAX style calls, where JavaScript updated only portions of the page. The .Net team added some hooks for it- special “AJAX enabled” controls, as well as helper functions, like __doPostBack, in the UI to generate URLs for “postbacks” to trigger server side execution. A postback is just a POST request with .NET specific state data in the body.

    All this said, Chris maintains a booking system for a boat rental company. Specifically, he’s a developer at a company which the boat rental company hires to maintain their site. The original developer left behind a barnacle covered mess of tangled lines and rotting hull.

    Let’s start with the view ASPX definition:

    <script>
    function btnSave_Click()
    {
        if (someCondition) 
        {
        //Trimmed for your own sanity
        
        //PostBack to Save Data into the Database.
            javascript:<%#getPostBack()%>;                   
        }
        else
        {
            return false;
        }
    }
    </script>
    <html>
          <body>
              <input type="button" value="  Save  Booking  " id="btnSave" class="button" title="Save [Alt]" onclick="btnSave_Click()" />
          </body>
    </html>
    

    __doPostBack is the .NET method for generating URLs for performing postbacks, and specifically, it populates two request fields: __EVENTTARGET (the ID of the UI element triggering the event) and __EVENTARGUMENT, an arbitrary field for your use. I assume getPostBack() is a helper method which calls that. The code in btnSave_Click is as submitted, and I think our submitter may have mangled it a bit in “trimming”, but I can see the goal is to ensure than when the onclick event fires, we perform a “postback” operation with some hard-coded values for __EVENTTARGET and __EVENTELEMENT.

    Or maybe it isn’t mangled, and this code just doesn’t work?

    I enjoy that the tool-tip “title” field specifies that it’s “[Alt]” text, and that the name of the button includes extra whitespace to ensure that it’s padded out to a good rendering size, instead of using CSS.

    But we can skip past this into the real meat. How this gets handled on the server side:

    Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs) Handles Me.Load
        '// Trimmed more garbage
        If Page.IsPostBack Then
            'Check if save button has been Clicked.
            Dim eventArg As String = Request("__EVENTARGUMENT")
            Dim offset As Integer = eventArg.IndexOf("@@@@@")
            If (offset > -1) Then
                'this is an event that we raised. so do whatever you need to here.
                Save()
            End If
        End If
    End Sub
    

    From this, I conclude that getPostBack populates the __EVENTARGUMENT field with a pile of “@”, and we use that to recognize that the save button was clicked. Except, and this is the important thing, if they populated the ID property with btnSave, then ASP .Net would automatically call btnSave_Click. The entire point of the __doPostBack functionality is that it hooks into the event handling pattern and acts just like any other postback, but lets you have JavaScript execute as part of sending the request.

    The entire application is a boat with multiple holes in it; it’s taking on water and going down, and like a good captain, Chris is absolutely not going down with it and looking for a lifeboat.

    Chris writes:

    The thing in its entirety is probably one of the biggest WTFs I’ve ever had to work with.
    I’ve held off submitting because nothing was ever straight forward enough to be understood without posting the entire website.

    Honestly, I’m still not sure I understand it, but I do hate it.

    [Advertisement]
    BuildMaster allows you to create a self-service release management platform that allows different teams to manage their applications. Explore how!

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-48757: Lovable’s Row-Level Security Breakdown Exposes Sensitive Data Across Hundreds of Projects
    Next Article Setting Up Terraform: Installation and Configuration

    Related Posts

    News & Updates

    Surface Pro 11 with Snapdragon X Elite drops to lowest price ever

    June 12, 2025
    News & Updates

    With WH40K Boltgun and Dungeons of Hinterberg, this month’s Humble Choice lineup is stacked for less than $12

    June 12, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-45343 – Tenda W18E Remote Code Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-20216 – Cisco Catalyst SD-WAN Manager Cross-Site Scripting (XSS)

    Common Vulnerabilities and Exposures (CVEs)
    Expense Management System Android App Using SQLite

    Expense Management System Android App Using SQLite

    Development

    CVE-2025-30169 – Aspect File Upload and Execute PHP Script Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-1330 – IBM CICS TX DNS Code Injection

    May 8, 2025

    CVE ID : CVE-2025-1330

    Published : May 8, 2025, 10:15 p.m. | 1 hour, 22 minutes ago

    Description : IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1  could allow a local user to execute arbitrary code on the system due to failure to handle DNS return requests by the gethostbyname function.

    Severity: 7.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-4723 – iSourcecode Placement Management System SQL Injection Vulnerability

    May 15, 2025

    CVE-2025-0649 – Google Tensorflow Serving JSON Deserialization Remote Crash

    May 6, 2025

    CVE-2025-4004 – PHPGurukul COVID19 Testing Management System SQL Injection Vulnerability

    April 28, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.