This was discussed on the private list after it was forwarded to [email protected] 
and the consensus is that this is just something we have to deal with. Themes 
containing malware and exploits have become an increasingly popular offering on 
sites advertising free blog themes, but as long as you allow any type of 
scripting access (whether it be raw PHP or a pseudo-language like Smarty) there 
is not much that can be done - the potential for foul play will always exist.

The same level of care and suspicion should apply when downloading a theme or 
plugin as when downloading anything else from the internet. Users should be 
encouraged to use addons from reputable locations like the -extras repository, 
where there is at least some additional visibility for contributions, and 
always be wary of any third party sites.


On Feb 4, 2011, at 12:21 AM, Matt-SD wrote:

> Say I build a theme.
> 
> Theme.xml contains legitimate stuff, but index.php (and perhaps the
> other files) contain some less-than-good stuff under the hood.
> 
> It looks like an acceptable theme when you see the screenshot & when
> you download it, you activate it & look at your theme to marvel in its
> greatness. BUT: somewhere hidden in the theme is this little gem:
> 
> <?php
> $str = Config::get('db_connection');
> ** Insert cross-site scripting here **
> ?>
> 
> Now your database info has been sent to another site & anybody who
> reads it on that other site can get into your database & mess around
> in it.
> 
> -- 
> To post to this group, send email to [email protected]
> To unsubscribe from this group, send email to 
> [email protected]
> For more options, visit this group at 
> http://groups.google.com/group/habari-dev

-- 
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at http://groups.google.com/group/habari-dev

Reply via email to