Hendrik Weimer wrote:
> Martin Schulze <[EMAIL PROTECTED]> writes:
>
> > How can the diricons and config parameters be exploited? From a quick
> > glance I can't find an open associated with $DirIcons.
>
> The diricons issue is a XSS vulnerability. It has nothing to do with
> the two other holes (which lead to arbitrary code execution) other
> than they all are a case of missing input sanitizing.
Umh... but since the query_string is already sanitised globally
how can XSS still happen? Was the sanitising not sucessful?
Regards,
Joey
--
It's time to close the windows.
Please always Cc to me when replying to me on the lists.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]