Yeah, realised after I posted. Thought you quoted my post. Sorry.
Standard is a good word. I don't know what to class myself but after writing a few CMS systems I find it now rather quite easy to write a CMS - but that's probably not my skill just how used to it I am.
If you require any help feel free to ask me. Also - I might have scoped you out for a project I may start later if you're interested.
Jcat
Three posts late? Sorry, I forgot that once a thread has been responded to with common sense that no one after that was allowed to respond, with additional common sense. I love how you take my post as an insult - it was simply telling you what the issue was, and how the code itself was not exploitable.
I don't care if you're learning or not - you shouldn't be releasing stuff that you haven't even bothered testing, or researching. That's like me coding a template purely in Notepad, and releasing it without checking it in my browser for issues within the code before I released it.
Really? Because I know that when people run a web script, they never worry about exploits within the script itself; thank you for enlightening all of us on how to patch stuff that is already patched.
When I used "/facepalm", I was simply referring to your continuation of telling people that it could be possible for someone to exploit this, instead of listening to them, and learning from what they told you.
Then close the thread, as it is worthless.
Last edited by RastaLulz; 18-07-11 at 01:11 PM.
Yes. But I realised that before, if you bothered to read. I didn't take your post as an insult. If people get insulted of what's wrote on the internet they are weak and stupid.
Fair enough. I did, but as stated before I don't know that much. Just enough. There might have been other possible ways. However I won't bother releasing the other patches in the future. The actual serious ones. (thanks David).
I just think there has been a miscommunication here that's all. So folks this isn't an exploit. I just thought it might have been with out realising what it does fully.
Thanks for the patch amen.
Finally. Thx mate
The password is sha1'd it doesnt need to be filtered...........why would you filter a sha1 hash? since its hashed anything they enter will be hashed.
$not_secure = $_POST['password'];
$secure = $core->sha1thisbitch($_POST['password']);
Last edited by XenoGFX; 22-08-11 at 12:44 AM.
Atleast you bothered to throw in a contribution you should be getting thanked for attempting to.
Nice attempt ;)