The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#11
|
||||
|
||||
![]()
Thats a shame that looked like a great mod and was ready to download it.... She does make good mods and never had any problems with them.
|
#12
|
|||
|
|||
![]()
well apparently mary has posted what has been going on about this mod, view here: http://www.madebymary.com/forums/showthread.php?p=3222
it doesn't make sense that first Calorie says there is a security risk, when it narrows down to a Error Page being displayed....i dont get it.... this mod should have never been taken off the mod pages. there is no security risk in it. we need more mods and addons for 3.6x, and coders liek Mary shouldn't be shut down because of mistakes by the staff here, first claiming it is a security risk, then next claiming its only a error page issue... if thats the case, bring the mod back and please, next time, control your left clicks. |
#13
|
||||
|
||||
![]()
Making posts when you have no idea of the facts is not a very clever thing to do.
There are several security risks in the code, no mistake has been made by the staff, only by you. |
#14
|
|||
|
|||
![]()
Taken from her site:
Quote:
|
#16
|
||||
|
||||
![]() Quote:
Why not just... clean things properly? As for the Pixy test, it's a complete joke because: 1) It only checks for XSS 3) Computers cannot check for secure code Believe it or not, they are not solely there to harass you and make your work look bad and insecure. You did that yourself, and you are making things worse now by trying to make them look bad for trying to help out the community. Would you rather people get hacked instead? And by instead, I mean both, because as it stands it looks like both are issues right now. So from what I can see at a glance, 1) Users can freely inject SQL 2) Users can freely delete files. 3) Users can freely perform cross site scripting If you want a feature suggestion, I have one. Add this: PHP Code:
To be honest I can't think of many other vulnerabilities than those 3, so maybe you should focus on fixing them before pointing fingers and ruining more falsely established trust. But, if you insist on thinking that they are out to get you purely based on competition, then you should file a formal complain to Marco or someone higher up in Jelsoft. Read this https://vborg.vbsupport.ru/showthread.php?t=154411 |
#17
|
|||
|
|||
![]() Quote:
![]() |
#18
|
|||
|
|||
![]()
[ot]also check this: https://vborg.vbsupport.ru/showthrea...=input+cleaner
![]() |
#19
|
|||
|
|||
![]()
Thanks also. I got all my security knowledge from vbadvanced. Brian is very strict on that. It's always good to have those 2 posts as a handy reference. Security is extremely important and should not be taken lightly.
|
#20
|
||||
|
||||
![]()
Well said Adrian. I wouldn't trust any coder that uses an online script to validate its security. There's only one safe way of doing it, and that's to have the knowledge required to know how to exploit applications, and not making those mistakes in yours
![]() |
![]() |
Thread Tools | |
Display Modes | |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|