lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060619222051.12891.qmail@securityfocus.com> Date: 19 Jun 2006 22:20:51 -0000 From: brian@...rum.org To: bugtraq@...urityfocus.com Subject: Re: # MHG Security Team --- PHORUM 5.1.13 Remote File Inc. This is a bogus report. Please mark it as such or remove it. This so called exploit is nothing but an attemtpt to defame the name of Phorum. 1. common.php is checked on the very first line of non-comment code that it is not being called directly. It has been this way in all 5.x version of Phorum. 2. The varialbe $PHORUM["http_path"] is only used for redirects and echoing in emails. It is never used to include or open files. 3. Versions of Phorum before 5.0 did not use the variable at all. THE MHG Security Team owes the Phorum Development Team a public apology.