| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070705114836.23444.qmail@securityfocus.com>
Date: 5 Jul 2007 11:48:36 -0000
From: not@...moment.thanks
To: bugtraq@...urityfocus.com
Subject: Re: Serious holes affecting JFFNMS
Per the following comments...
"Finally, the auth.php PHP script also includes the following code:
if (($jffnms_version=="0.0.0") && ($_SERVER["REMOTE_ADDR"]=="128.30.52.13")) {
which could be considered a backdoor althought it does not appear to be
exploitable in a typical installation."
...it should be noted that 128.30.52.13 is likely the source IP address of the W3.ORG validator. So perhaps the PHP code intends to behave differently during a W3.ORG validation test.