Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
v3.3.16 Vulnerability - CVE-2020-24861
#12
There is line 81 in admin/settings.php:

PHP Code:
if(isset($_POST['permalink'])) { 
  $PERMALINK trim($_POST['permalink']); 
 } 

Replacing this with

PHP Code:
if(isset($_POST['permalink'])) {
    $badchars = array('<',  '>',  '(',  ')',  '{',  '}',  '[',  ']',  ' ',  "\t",  "\r",  "\n");
    $PERMALINK str_replace($badchars''$_POST['permalink']); 


i.e. removing all kinds of brackets, plus freespace, should bork any attempt of scripting reliably.
You might go even further, setting $PERMALINK to "" when detecting any of them in $_POST['permalink'].
These characters should not be part of an url anyway.

What am I missing?
Reply


Messages In This Thread
v3.3.16 Vulnerability - CVE-2020-24861 - by Brex - 2021-09-15, 19:04:48
RE: v3.3.16 Vulnerability - CVE-2020-24861 - by Knobbles - 2022-04-26, 04:23:29



Users browsing this thread: 1 Guest(s)