The Forum has been Updated
        The code has been upgraded to the latest .NET core version. Please check instructions in the Community Announcements about migrating your account.
    
                        this fix relates to http://secunia.com/advisories/24358/
in pop_profile.asp look for the following lines of code
parts = split(rs("M_MSN"),"@")
in a clean pop_profile this will be on line 334 and again on line 609
replace that line with the line below.
parts = split(ChkString(rs("M_MSN"), "display"),"@")
Alternatively you can just disable the MSN messanger link from the admin options<
                in pop_profile.asp look for the following lines of code
parts = split(rs("M_MSN"),"@")
in a clean pop_profile this will be on line 334 and again on line 609
replace that line with the line below.
parts = split(ChkString(rs("M_MSN"), "display"),"@")
Alternatively you can just disable the MSN messanger link from the admin options<
                                Postet den 
                                
                                
                                
                                    
                                    
                                
                            
                            
                                        Thanks Huw!
I wanted to check to see if anybody had attempted to exploit this on any of my fora and so I ran the following SQL query:
select MEMBER_ID, M_MSN from FORUM_MEMBERS where M_MSN != '';
and then browsed the M_MSN field for script.
Was I looking in the right place? i.e. Is that where the script would have been placed?<
                                I wanted to check to see if anybody had attempted to exploit this on any of my fora and so I ran the following SQL query:
select MEMBER_ID, M_MSN from FORUM_MEMBERS where M_MSN != '';
and then browsed the M_MSN field for script.
Was I looking in the right place? i.e. Is that where the script would have been placed?<
                                Postet den 
                                
                                
                                
                                    
                                    
                                
                            
                            
                                        yes, that is the correct field to look in<
                                        
                                    
                                
                                Postet den 
                                
                                
                                
                                    
                                    
                                
                            
                            
                                        Hi,
I founded this vulnerability and your solution doesn't really work, I could exploit it on my test site with no problems at all.
The single quotes are the real problem, using "display" only replaces double quotes and "plus" signs.
Bye
P.S.: also the vulnerability is found in pop_messengers.asp<
                                I founded this vulnerability and your solution doesn't really work, I could exploit it on my test site with no problems at all.
The single quotes are the real problem, using "display" only replaces double quotes and "plus" signs.
Bye
P.S.: also the vulnerability is found in pop_messengers.asp<
                                Sist redigert av
                                
                            
                        
                                Postet den 
                                
                                
                                
                                    
                                    
                                
                            
                            
                                        Hmm, hard to put replace(x,"'","''") thing?<
                                        
                                    
                                
                                Postet den 
                                
                                
                                
                                    
                                    
                                
                            
                            Originally posted by Stefano Angaranperhaps in future you could follow the guidlines of secunia and inform us the developers of your findings rather than being a twat and making a public report about it.<
Hi,
I founded this vulnerability and your solution doesn't really work, I could exploit it on my test site with no problems at all.
The single quotes are the real problem, using "display" only replaces double quotes and "plus" signs.
Bye
P.S.: also the vulnerability is found in pop_messengers.asp
                                Postet den 
                                
                                
                                
                                    
                                    
                                
                            
                            
                                        I would advise users to disable MSN until we post a full fix.<
                                        
                                    
                                
                                Postet den 
                                
                                
                                
                                    
                                    
                                
                            
                            
                                        The fix to this issue is to ensure that any data inserted into the MSN field is a valid email value. As such, here are the changes needed to properly validate the input to the MSN field.
1. register.asp
At approximately line#293, where you now have
Replace it by
2. Pop_profile.asp
Approximately at line# 1065 and line# 1386 (line# already including the first change), where you now have
replace it by
<
                                        
                                    
                                1. register.asp
At approximately line#293, where you now have
Code:
                if strMSN = "1" and trim(Request.Form("MSN")) <> "" then
		   if EmailField(Request.Form("MSN")) = 0 then 
			Err_Msg = Err_Msg & "<li>You Must enter a valid MSN Messenger Username</li>"
		    end if
		end if
Replace it by
Code:
         if strMSN = "1" and trim(Request.Form("MSN")) <> "" then
            set regEx = New RegExp
	    regEx.Global = true
            regEx.IgnoreCase = true
	    regEx.Pattern =  "^[A-Z0-9._%-]+@(?:[A-Z0-9-]+\.)+[A-Z]{2,4}$"
	    retVal = regEx.Test(Request.Form("MSN"))
	    If Not retVal Then
	       Err_Msg = Err_Msg & "<li>You Must enter a valid MSN Messenger Username</li>"
	    end if
	end if
2. Pop_profile.asp
Approximately at line# 1065 and line# 1386 (line# already including the first change), where you now have
Code:
             if strMSN = "1" and trim(Request.Form("MSN")) <> "" then
		if EmailField(Request.Form("MSN")) = 0 then 
		   Err_Msg = Err_Msg & "<li>You Must enter a valid MSN Messenger Username</li>"
		end if
	     end if
Code:
          if strMSN = "1" and trim(Request.Form("MSN")) <> "" then
            set regEx = New RegExp
	    regEx.Global = true
            regEx.IgnoreCase = true
	    regEx.Pattern =  "^[A-Z0-9._%-]+@(?:[A-Z0-9-]+\.)+[A-Z]{2,4}$"
	    retVal = regEx.Test(Request.Form("MSN"))
	    If Not retVal Then
		Err_Msg = Err_Msg & "<li>You Must enter a valid MSN Messenger Username</li>"
	    end if
	end if
                                Postet den 
                                
                                
                                
                                    
                                    
                                
                            
                            
                                        I've updated the regular expression used to validate the email, because it was failing in some situations. Also, as this one is more simple and is only including upper case letters, regEx.IgnoreCase = true was also added.
This expression will work in almost all common cases, but it will fail in some cases. I had to replace it because the expression I got from my regular expressions source failed where I didn't expect it to. This one was found here. You will also find at the same URL a very, very long expression that will work in every possible case. Use it if you want to.<
                                This expression will work in almost all common cases, but it will fail in some cases. I had to replace it because the expression I got from my regular expressions source failed where I didn't expect it to. This one was found here. You will also find at the same URL a very, very long expression that will work in every possible case. Use it if you want to.<
Email Member
Message Member
Post Moderation
Filopplasting
If you're having problems uploading, try choosing a smaller image.
Forhåndsvis post
Send Topic
                    
                    Loading...