lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20071218203113.24788.qmail@securityfocus.com> Date: 18 Dec 2007 20:31:13 -0000 From: recklessb@...rs.sourceforge.net To: bugtraq@...urityfocus.com Subject: Re: Uber Uploader <= 5.3.6 Remote File Upload Vulnerability UU already provides a mechanism to detect file extensions client and server side. It is "YOUR" responsibility when you install this script to add file extensions that you may or may not want uploaded. Jeesh! $disallow_extensions = '/(sh|php|php3|php4|php5|py|shtml|phtml|cgi|pl|plx|htaccess|htpasswd)$/i'; $allow_extensions = '/(jpg|jpeg|gif|bmp)$/i';