Wakaba/Kareha patches (107)

88 Name: Anonymous : 2012-02-05 14:57 ID:lrw7jQEH (Image: 0x0 patch, 0 kb) [Del]

Anyone running a Wakaba board ought to read this.

There's a serious vulnerability in Wakaba 3.0.8 and below which let's anyone inject whatever HTML they want to in posts. This can be fixed by removing a couple of lines in the get_decoded_hashref() and get_decoded_arrayref() subroutines in wakaba.pl, as shown in the included patch file. There should be no problem in making these changes.

Board moderators with no access to the board files may add /chr\([0-9]/ to spam.txt in order to fix the problem.

Name: Link:
Leave these fields empty (spam trap):
More options...
Verification: