lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070121184009.16584.qmail@securityfocus.com> Date: 21 Jan 2007 18:40:09 -0000 From: lfx4sodas@...il.com To: bugtraq@...urityfocus.com Subject: Re: SMF "index.php?action=pm" Cross Site-Scripting SMF 1.1.1 is vulnerabil too. solution -> In file PersonalMessage.php change 1417 and 1418 lines adding htmlspecialchars() like this -> $_REQUEST['to'] = empty($_POST['to']) ? (empty($_GET['to']) ? '' : $_GET['to']) : htmlspecialchars(stripslashes($_POST['to'])); $_REQUEST['bcc'] = empty($_POST['bcc']) ? (empty($_GET['bcc']) ? '' : $_GET['bcc']) : htmlspecialchars(stripslashes($_POST['bcc']));