Today´s DiaryIf you have more information or corrections regarding our diary, click here to contact us.
Published: 2009-08-11,
3 comment(s)
Last Updated: 2009-08-12 12:03:41 UTC by Swa Frantzen (Version: 3) Juha-Matti pointed out multiple reports on a vulnerability in the widely used wordpress blog software that supposedly allows remote users to reset the administrative password. They all lead to an original post on a full disclosure mailing list. The attack uses an ability of PHP to not only set values on variables, but also make them arrays. Basically a GET request can add data like: http://www.example.com?data Many environments use the data portion to create variable=value pairs: http://www.example.com?variable1=value1&variable2=value2 actually the & needs to be encoded as & to create proper html, but many ignore that rule PHP takes this a notch further by allowing arrays to be created from a GET as well: http://www.example.com?variable[]=value1&variable[]=value2 PHP being a typeless environment, this means that if you process variables submitted by a user, the developer needs to be careful not to be fed an array by an attacker instead of the expected string ... A fix is in the making here: http://core.trac.wordpress.org/changeset/11798. So I guess those who use wordpress will see an updated version soon enough. One cannot stress the importance of proper input filtering enough. The "handy" feature to submit an array in a GET request might well be ignored by many other developers beyond those at wordpress, so if you wrote PHP code yourself, best verify for this possibility. UPDATE: Wordpress released 2.8.4 to fix the issue. --
Keywords: wordpress
3 comment(s)
Published: 2009-08-11,
0 comment(s)
Last Updated: 2009-08-11 21:33:45 UTC by Swa Frantzen (Version: 3) Apple released today Safari 4.0.3. which is said to include -at this point still unknown- some security fixes. Quoting the information on the updater: This update is recommended for all Safari users and includes improvements to stability, compatibility and security including:
Fixed:
More details of the vulnerabilities http://support.apple.com/kb/HT3733 --
Published: 2009-08-11,
0 comment(s)
Last Updated: 2009-08-11 19:22:14 UTC by Swa Frantzen (Version: 1) Overview of the August 2009 Microsoft patches and their status.
We will update issues on this page for about a week or so as they evolve.
We appreciate updates US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY (*): ISC rating
(**): If installed. (***): Critical of ISA servers -- If you have more information or corrections regarding our diary, click here to contact us. Diary Archive
Search Diaries: |
StormCastlast update 08 hrs 33 min ago. Featured EventLatest Reading Room Papers
PollTrendsWorld Map |