lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040905110006.26098.qmail@www.securityfocus.com>
Date: 5 Sep 2004 11:00:06 -0000
From: Pierquinto Manco <mantra@....it>
To: bugtraq@...urityfocus.com
Subject: PHP-Nuke 7.4 Multiple XSS Vulnerabilities Patch




***************************************************************
                         CODEBUG LABS
PATCH #1 to [XSS] Vulnerabilities in Admin Panel of PHP-NUKE 7.4
***************************************************************
To Patch your admin panel from this vulnerabilities hurricane you have to
apply this code to your admin.php file:
if ( !empty($HTTP_GET_VARS['admin']) ) {
	die("Shit! Mantra wins =)");
}

if ( !empty($HTTP_POST_VARS['admin']) ) {
	die("Shit! Mantra wins =)");
}

-) Note
Previous patch(CODEBUG #1,#2,#3) isn't enough performant.
Try this one.
There are a lot of this problem in PHP-Nuke 7.4, my patch will check
the content of $_POST[admin] and $_GET[admin].
I'm going to post all this vulnerabilities on my site...
http://www.mantralab.org

**************************************************************
		http://www.mantralab.org
**************************************************************


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ