lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070414142502.9691.qmail@securityfocus.com> Date: 14 Apr 2007 14:25:02 -0000 From: scott-REMOVE@...lletin.com To: bugtraq@...urityfocus.com Subject: Re: Vbulletin 3.6.5 Sql Injection ! [misc.php] There is no SQL injection being performed on that page, the proof of concept script simple grabs any 32 character string from the page, the one in question happens to be a logout hash. The logout hash is used to mitigate a CSRF.