5
Quote:
...
Solution:
Edit the source code to ensure that input is properly verified.
Set "register_globals" to "Off"
...
1) My understanding is that either of these remedies will remove the vulnerablity.
I.e., if
either the source code is edited to verify the input,
or if register_globals is turned off, then the vulnerability is removed.
Please correct me if I'm wrong.
2) Here's a suggested "quick fix" for the source code:
class/xoopseditor/textarea/editor_registry.php
$root_path = dirname($current_path);
[color=ff0000]// Replace unsafe characters with underscores.
$xoopsConfig['language'] = preg_replace('/[^A-Za-z0-9._.-]/', '_', $xoopsConfig['language']);[/color]
if(file_exists($root_path."/language/".$xoopsConfig['language'].".php")){