You are missing our premiere tool bar navigation system! Register and use it for FREE!

NukeCops  
•  Home •  Downloads •  Gallery •  Your Account •  Forums • 
Readme First
- Readme First! -

Read and follow the rules, otherwise your posts will be closed
Modules
· Home
· FAQ
· Buy a Theme
· Advertising
· AvantGo
· Bookmarks
· Columbia
· Community
· Donations
· Downloads
· Feedback
· Forums
· PHP-Nuke HOWTO
· Private Messages
· Search
· Statistics
· Stories Archive
· Submit News
· Surveys
· Theme Gallery
· Top
· Topics
· Your Account
Who's Online
There are currently, 260 guest(s) and 0 member(s) that are online.

You are Anonymous user. You can register for free by clicking here
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register

Re: (Score: 0)
by Anonymous on Tuesday, February 04 @ 05:40:48 CET
Note: A more elegant fix would be better. Standard variable input validation used throughout the core code would cut down drastically on these XSS exploits. What I posted above was just the quickest thing I could get up to my site to remove the vulnerability.

If I knew regex's better I'd just match against a valid image file name [else unset($user_avatar)]. Shouldn't be tough.


| Parent
  • Re: by Zhen-Xjell on Tuesday, February 04 @ 05:46:36 CET
    • Re: by sixonetonoffun on Tuesday, February 04 @ 09:49:58 CET
      • Re: by Zhen-Xjell on Tuesday, February 04 @ 14:33:00 CET
        • Re: by sixonetonoffun on Tuesday, February 04 @ 21:26:49 CET
Powered by TOGETHER TEAM srl ITALY http://www.togetherteam.it - DONDELEO E-COMMERCE http://www.DonDeLeo.com - TUTTISU E-COMMERCE http://www.tuttisu.it
Web site engine's code is Copyright © 2002 by PHP-Nuke. All Rights Reserved. PHP-Nuke is Free Software released under the GNU/GPL license.
Page Generation: 0.051 Seconds - 249 pages served in past 5 minutes. Nuke Cops Founded by Paul Laudanski (Zhen-Xjell)
:: FI Theme :: PHP-Nuke theme by coldblooded (www.nukemods.com) ::