----- Original Message -----
From: "Muhammad Faisal Rauf Danka" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Thursday, November 07, 2002 10:49 PM
Subject: XSS in Postnuke Rogue release (0.72)


> On postnuke’s own website this issue is handled very
> effectively by bouncing the user back to the  > “./index.php”
> without giving any errors, thus reducing the chances of webroot
> disclosure too. I hope such functionality be added to the
> downloadable version of postnuke’s latest
> build too for the benefit of the users.

http://developers.postnuke.com/modules.php?op=modload&name=Downloads&file=in
dex&req=viewdownload&cid=1

This patch also emails the site admin with an impressive "possible hack
attempt" notice.  I installed the 2 files and my site is no longer
vulnerable.


Rick Up

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to