View Single Post
  #1  
Old 9th April 2009, 08:53
kp380lv's Avatar
kp380lv kp380lv is offline
Senior Member
 
Join Date: May 2008
Latvia
Posts: 388
Default Yuna Scatari v2.2 PRE7 By kp380lv - Hotfixes
Potential dangerous XSS hole in simpaty.php

Find this:

Code:
<form action=\"" . $_SERVER["PHP_SELF"] . "?action=add&amp;" . ($resp_type == 1?'good':'bad') . "&amp;type=$type&amp;targetid=$targetid\" method=\"post\">
And replace with this:

Code:
<form action=\"" . $_SERVER["PHP_SELF"] . "?action=add&amp;" . ($resp_type == 1?'good':'bad') . "&amp;type=".htmlspecialchars($type)."&amp;targetid=$targetid\" method=\"post\">
Then in simpaty.php find this:

Code:
$type = $_GET['type'
And replace with:

Code:
$type = htmlentities($_GET['type']);
index.php - (Blind SQL Injection in index.php)

Find this:

Code:
$choice = $_POST["choice"];
Replace with:

Code:
$choice = (int) $_POST["choice"];
This list still be updated!!!
Reply With Quote
The Following User Says Thank You to kp380lv For This Useful Post:
Masterdan (8th July 2009)