![]() |
Reported 4.0.2 PL1 XSS Vunerability Regarding this reported exploit: http://inj3ct0r.com/exploits/9697 An official patch is forthcoming. Meanwhile I have attached a patched type.php file to this message. Unzip that file and upload it, replacing the existing ../vb/search/type.php file Note: This is for those running 4.0.2 PL1 only. If for some reason you want to apply this patch yourself, find the following file: ../vb/search/type.php In that type.php file, find this near the bottom of the file: 'query' => TYPE_STR, Replace that with this: 'query' => TYPE_NOHTML, Please note that if you have already applied Paul M's path here, then you do not have to apply this patch. Attached Files |
الساعة الآن 03:44 AM |
Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO 3.5.2 TranZ By
Almuhajir