[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <013701c28a1b$9f96b780$0200a8c0@nothing>
From: dislists at updegrove.net (Rick Updegrove)
Subject: Re: XSS in Postnuke Rogue release (0.72)
----- Original Message -----
From: "Muhammad Faisal Rauf Danka" <mfrd@...itudex.com>
To: <bugtraq@...urityfocus.com>; <full-disclosure@...ts.netsys.com>;
<vulnwatch@...nwatch.org>
Sent: Thursday, November 07, 2002 10:49 PM
Subject: XSS in Postnuke Rogue release (0.72)
> On postnuke?s own website this issue is handled very
> effectively by bouncing the user back to the > ?./index.php?
> without giving any errors, thus reducing the chances of webroot
> disclosure too. I hope such functionality be added to the
> downloadable version of postnuke?s latest
> build too for the benefit of the users.
http://developers.postnuke.com/modules.php?op=modload&name=Downloads&file=in
dex&req=viewdownload&cid=1
This patch also emails the site admin with an impressive "possible hack
attempt" notice. I installed the 2 files and my site is no longer
vulnerable.
Rick Up
Powered by blists - more mailing lists