Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Possible Exploit?
#1
I found this recently and I it made me think that GS could be susceptible.
http://blog.nearlyfreespeech.net/2009/11...explained/
Clients always want to be able to change the content of their pages, but they are unwilling to do so.

Have you ever coded in your underwear before?
Reply
#2
We are putting a path infront of the $_GET['id'], so you shouldn’t be able to get it to read an external file:
Code:
$file = "data/pages/". $id .".xml"
It also tests for file existence, and it will report something like "data/pages/http://google.com/hack.php?.xml" to not exist.

So no, I think this won’t be a problem on the GetSimple front-end.
“Don’t forget the important ˚ (not °) on the a,” says the Unicode lover.
Help us test a key change for the core! ¶ Problems with GetSimple? Be sure to enable debug mode!
Reply




Users browsing this thread: 1 Guest(s)