Jump to content

Recommended Posts

  • Administrators
Posted

Thanks for the heads up - I've contacted the addon's author.

Remember - don't trust ANY input - cast values to the appropriate type (in this case, integer) and then escape everything that comes in

  • Administrators
Posted

The module has been updated on GitHub. The method that is used in this exploit example is also over a year old, the module was updated in March 2012 to normalize the functions within the phpVMS environment.

If you are using the version that was updated in March of 2012 you only need to replace the PopUpNews.php and PopUpNewsData.class.php files, or make the edits to them. If you are using the older version that used the "$_GET" method I would suggest updating to the latest version.

Commits can be found here -> https://github.com/DavidJClark/phpVMS-PopUpNews/commits/master

Module can be found here -> https://github.com/DavidJClark/phpVMS-PopUpNews

  • Like 2

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...