Mega exploit in 3.8.6
Collapse
This topic is closed.
X
X
-
-
So, what's the exploit (anyone care to PM)? I'd like to patch manually, and not wait on IB.Regards,
Eric Sizemore
My modificationsComment
-
I've published a patch, which perhaps works; http://kwn.me/wtn386patch
Back to making dinner
Disclaimer, it's not the official patch of course, it has no protection at all, so:
- backup your forum
- test if it is vulnerable
- upload to forum dir
- run it
- remove file
- test if vulnerableComment
-
Where has vB.com said they are fixing it? I saw on twitter that florris has a fix on vbfans.
I'm glad I held off upgrading to 3.8.6....I knew something would crop up the second IB touched that nice stable Jelsoft code!Comment
-
The issue only exists in 3.8.6 as far as I am aware, on top of that it would be suicidal for any company to intentionally implement a huge security risk such as this.
A patch is coming, new downloads are already fixed.Comment
-
As stated above, the issue is that a debugging phrase was left in the download. The actual faq.php file is not at risk. However since FAQs are indeed phrases, phrases will be parsed. An updated language file will be released shortly. You will then be able to import this and resolve the issue. However if the phrase is added to any version of vBulletin, then you can expose your information. We recommend that you do not do so.
If you redownload vBulletin 3.8.6 and run install/finalupgrade.php, then it should also fix this issue as the download has already been updated.Translations provided by Google.
Wayne Luke
The Rabid Badger - a vBulletin Cloud demonstration site.
vBulletin 5 APIComment
widgetinstance 262 (Related Topics) skipped due to lack of content & hide_module_if_empty option.
Comment