![]() |
MPA3 compromised ?
Quote:
Link to full story |
That's an oops.
|
Yeah, they "fixed" it by telling programs to restrict IP's to the admin section.
There are ways around that as well. What all else has been fixed since then, I don't know. The entire exploit has been posted on a bunch of places around the net. So fixing it as soon as they were informed about it likely didn't avoid much damage since it could have been around for some time before that. I wonder if minuseonebit will/would go after them with the same vigor he did for NATS. |
Anything plugged in to fiber is vulnerable.
Coding core using safe practices is the best safeguard against PHP and MySql injections, but that doesn't just secure anything and everything. The important part is recognizing and correcting and weak points in potentially vulnerable scripts. People try to inject my scripts all the time, it's a fact out here. The best thing I can do to protect myself is to use safe coding practices instead of shortcuts, and to buy safe coded commercial scripts and even check them myself if there's any doubt as to their security. If Oystein is fixing it/has fixed it, then great. It's still vulnerable. It's plugged in. So is my bank. My bank had good software, so does Oystein. YP |
and you guys still wonder where all the passwords in password forums come from..?
|
It happens. The best of developers can screw up. All it takes is a long day of coding or lack of sleep to accidentally skip over sanitizing user submitted data.
Atleast he had it fixed (in some form) :thumbsup |
One of the easiest flaws to deal with yet thousands of developers (or I should say amateurs, rather) continue to not protect their sql scripts. I find it simply amazing. :disgust
|
MPA is solid and they are very proactive.
Mitch |
All times are GMT -7. The time now is 09:14 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123