Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Important! Vulnerability Found in GetSimple 2.03
#7
ccagle8 Wrote:http://code.google.com/p/get-simple-cms/..._svn204_34

instead of deleting upload-ajax.php you can also make the change above to your cookie_functions.php file.

Replacing the function using the SVN code:
Code:
function kill_cookie($identifier) {
  global $SALT;
  $saltCOOKIE = sha1($identifier.$SALT);
  if (isset($_COOKIE[$saltCOOKIE])) {
    if ( defined('GSCOOKIEISSITEWIDE') && (GSCOOKIEISSITEWIDE == TRUE) ) {
       $_COOKIE[$saltCOOKIE] = FALSE;
       setcookie($saltCOOKIE, FALSE, time() - 3600,'/');    
    } else {
       $_COOKIE[$saltCOOKIE] = FALSE;
       setcookie($saltCOOKIE, FALSE, time() - 3600);
    }
  }
}

gives me:

Quote:Parse error: syntax error, unexpected T_IF in /home/cartocop/testbed/admin/inc/cookie_functions.php on line 41

Line 41 is the "if defined" line.

Any other suggestions?

-Rob A>
Reply


Messages In This Thread
Important! Vulnerability Found in GetSimple 2.03 - by RobA - 2011-02-16, 05:42:51



Users browsing this thread: 1 Guest(s)