lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: dislists at updegrove.net (Rick Updegrove)
Subject: Re: XSS in Postnuke Rogue release (0.72)

----- Original Message -----
From: "Muhammad Faisal Rauf Danka" <mfrd@...itudex.com>
To: <bugtraq@...urityfocus.com>; <full-disclosure@...ts.netsys.com>;
<vulnwatch@...nwatch.org>
Sent: Thursday, November 07, 2002 10:49 PM
Subject: XSS in Postnuke Rogue release (0.72)


> On postnuke?s own website this issue is handled very
> effectively by bouncing the user back to the  > ?./index.php?
> without giving any errors, thus reducing the chances of webroot
> disclosure too. I hope such functionality be added to the
> downloadable version of postnuke?s latest
> build too for the benefit of the users.

http://developers.postnuke.com/modules.php?op=modload&name=Downloads&file=in
dex&req=viewdownload&cid=1

This patch also emails the site admin with an impressive "possible hack
attempt" notice.  I installed the 2 files and my site is no longer
vulnerable.


Rick Up


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ