I'm not sure why I should do this. This community has done nothing for me besides for a few individuals. Anyways, I'm not going to bitch. I'll keep this simple.
After coding an extra feature into the UberCMS housekeeping I noticed that when I opened login.php (in /manage/pages) I found that the variable $password was unfiltered. Now, whilst I'm not sure if you can exploit this due to it being hashed right after it still could potentially be one (hence the title).
So to tighten up security and possibly evade a MySQL injection we can easily patch it by:
1) Open login.php in /manage/pages
2) Find3) Add the filter tags around it filter() like so:PHP Code:$password = $core->uberHash($_POST['pwd']);
And there you go. A potential exploit fixed.PHP Code:$password = filter($core->uberHash($_POST['pwd']));
Just to add: If you do not understand this don't post. And if some one does ask a question on how to set this up/put it in don't answer them. It's clear as day so don't ease their stupidity.
thx





