Re: IPB v2.x up to 3.0.4 XSS vulnerability

看板Bugtraq作者時間16年前 (2009/12/15 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/2 (看更多)
Hello Bugtraq and Xacker! As I mentioned at my site (http://websecurity.com.ua/3762/), where I posted about this XSS vulnerability in Invision Power Board, the fix offered by Xacker is not effective. And better to use another method of fixing offered by me. Author of this advisory said, that in IPB a MIME-type application/x-dirview is set for txt files. But at my forum (on IPB 2.2.2) for txt files a MIME-type text/plain was set by default and the attack was worked. So recommendation of the author to set text/plain is not effective (and in IPB 1.x there is no possibility to set MIME-type at all) and I recommend to turn-off support of txt files at the forum. P.S. Yesterday I posted advisory about new XSS vulnerabilities in Invision Power Board and soon I'll send its English versions to Bugtraq. Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua ----- Original Message ----- From: Xacker (old good xacker gmail com) > [+] Invision Power Board XSS vulnerability > > ... > > [+] Fix > > Simply change MIME-type of *.txt files (and any other similar > formats) to (text/plain).
文章代碼(AID): #1B9drZ_R (Bugtraq)
文章代碼(AID): #1B9drZ_R (Bugtraq)