GetSimple Support Forum

Full Version: Exploit "set" parameter
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
http://forums.cnet.com/7726-6035_102-5128818.html

is that still unfixed ?
how can i fix it ?
Quick fix. Edit /admin/inc/plugin_functions.php, line 33:
Code:
if (isset($_GET['set'])){
Change to:
Code:
if (isset($_GET['set']) && substr($_SERVER["SCRIPT_NAME"],strrpos($_SERVER["SCRIPT_NAME"],"/")+1)!='index.php'){
This is fixed in the latest SVN.

Official fix can be seen here:

http://code.google.com/p/get-simple-cms/...tail?r=487

Mike....
n00dles101 Wrote:This is fixed in the latest SVN.

Official fix can be seen here:

http://code.google.com/p/get-simple-cms/...tail?r=487

Mike....

Lots of changes in upload.php since the 3.0 "official" release (I don't run svn on production). What is is minimum security patch that can be done to close this vulnerability?

-Rob A>