Jump to content

Vulnerability In Jack's Formmail Script


Recommended Posts

An advisory has been released regarding Jack's FormMail script v5.0.

 

Jack's FormMail script is not a TCH supported or supplied script, but I know many users use it. The above vulnerability can allow a remote user to gain access to read files normally not viewable through your website (such as your .htaccess file, or other private files). The following fix is recommended for users of Jack's FormMail script until a new version is released that fixes this problem:

Remove the following code from the FormMail.php script.

------------------------------------------------------

if (file_exists($ar_file)) {

  $fd = fopen($ar_file, "rb");

  $ar_message = fread($fd, filesize($ar_file));

  fclose($fd);

  mail_it($ar_message, ($ar_subject)?stripslashes($ar_subject):"RE: Form Submission", ($ar_from)?$ar_from:$recipient, $email);

}

------------------------------------------------------

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...