Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Exploit "set" parameter
#1
http://forums.cnet.com/7726-6035_102-5128818.html

is that still unfixed ?
how can i fix it ?
Reply
#2
Quick fix. Edit /admin/inc/plugin_functions.php, line 33:
Code:
if (isset($_GET['set'])){
Change to:
Code:
if (isset($_GET['set']) && substr($_SERVER["SCRIPT_NAME"],strrpos($_SERVER["SCRIPT_NAME"],"/")+1)!='index.php'){
Reply
#3
This is fixed in the latest SVN.

Official fix can be seen here:

http://code.google.com/p/get-simple-cms/...tail?r=487

Mike....
My Github Repos: Github
Website: DigiMute
Reply
#4
n00dles101 Wrote:This is fixed in the latest SVN.

Official fix can be seen here:

http://code.google.com/p/get-simple-cms/...tail?r=487

Mike....

Lots of changes in upload.php since the 3.0 "official" release (I don't run svn on production). What is is minimum security patch that can be done to close this vulnerability?

-Rob A>
Reply




Users browsing this thread: 1 Guest(s)