From 14ac9e3f19ac6a853e21496a63d4153cbd8175e0 Mon Sep 17 00:00:00 2001 From: Regis Houssin Date: Tue, 26 Apr 2011 20:11:18 +0000 Subject: [PATCH] Fix: A local file inclusion vulnerability can be exploited to include arbitrary files. --- htdocs/main.inc.php | 5 +++-- htdocs/user/passwordforgotten.php | 25 +++++++++++++------------ 2 files changed, 16 insertions(+), 14 deletions(-) diff --git a/htdocs/main.inc.php b/htdocs/main.inc.php index 5785f1f5b64..6049738dc6d 100644 --- a/htdocs/main.inc.php +++ b/htdocs/main.inc.php @@ -74,6 +74,7 @@ function test_sql_and_script_inject($val,$get) $sql_inj += preg_match('/insert[\s]+into/i', $val); $sql_inj += preg_match('/select.+from/i', $val); $sql_inj += preg_match('/union.+select/i', $val); + $sql_inj += preg_match('/(\.\.%2f)+/i', $val); // For XSS Injection done by adding javascript with script $sql_inj += preg_match('/