lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: 2 Feb 2007 12:16:11 -0000 From: grudge@...plemachines.org To: bugtraq@...urityfocus.com Subject: Re: SMF "index.php?action=pm" Cross Site-Scripting We intend to release a patch for this and a few other reported bugs within the next day or two (We need to complete testing on it). Note that this is an extremely difficult exploit to achieve. It requires a user to follow a link posted by someone else to "Send a PM" with some HTML entities within the query string and then (I believe) to hit submit at least once. I would hope that the chances of anyone falling for such a exploit would be extremely low indeed!