Exploit 1.4.19? Exploit 1.4.19?
 

News:

CPG Release 1.6.26
Correct PHP8.2 issues with user and language managers.
Additional fixes for PHP 8.2
Correct PHP8 error with SMF 2.0 bridge.
Correct IPTC supplimental category parsing.
Download and info HERE

Main Menu

Exploit 1.4.19?

Started by mahdi1234, January 29, 2009, 08:13:34 PM

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

mahdi1234


Joachim Müller

Thanks for letting us know - that's a brand-new one. We'll look into this and come up with a resolution as soon as possible.

Abbas Ali

I can confirm this exploit. Working for a fix.

The patch given by the reporter unsets all variables which were registered because of register_globals on. I think this is the correct way.
Chief Geek at Ranium Systems

Joachim Müller

cpg1.4.20 has just been released, which takes care of the exploit. See corresponding announcement thread cpg1.4.20 Security release - upgrade mandatory!