Possible XSS Issue Addressed in IP.Board

Статус
В этой теме нельзя размещать новые ответы.
S

SNap!

Прохожие
It has come to our attention that a bug in Internet Explorer 6 and 7 can allow an XSS (cross-site scripting) attack by forcing uploaded image and PDF files to run as HTML which could allow an attack to run code through a user's browser. It should be noted that the XSS damage is significantly mitigated by the "HttpOnly" cookies which were introduced in IP.Board 2.2.0. This means that sensitive cookies in IP.Board 2.2.0 and higher cannot be read by JavaScript which could be crafted using this bug.

Although this is a significant flaw within Internet Explorer, we have made a work around to resolve this issue by scanning uploaded files for possible malicious code. If a file is found to contain code that should not exist, such as HTML or JavaScript in an image file, the upload will be denied.

The download packages for IP.Board as of this date have been updated to include the patch. To patch an existing installation of IP.Board 2.1.x or 2.2.x, download the appropriate patch file:

Simply upload the class_upload.php file for your appropriate version into the ips_kernel directory overwriting the existing file.
 

Вложения

  • class_upload.2.1.x.rar
    2,8 KB · Просмотры: 15
  • class_upload.2.2.x.rar
    2,8 KB · Просмотры: 33
  • update_security.gif
    update_security.gif
    8,5 KB · Просмотры: 9
можно изменения для 2.2.2 ? :)
а то файл уже модифицировал (ток не помню что иммено) =)
 
Статус
В этой теме нельзя размещать новые ответы.
Назад
Сверху