Jump to content

Recommended Posts

Posted

Secunia reports this as Highly critical.

Read more at: http://secunia.com/advisories/22775/

 

Description:

CoLd Zero has discovered two vulnerabilities in DodosMail, which can be exploited by malicious people to disclose sensitive information and potentially compromise a vulnerable system.

 

Input passed to the "dodosmail_header_file" and "dodosmail_footer_file" parameters in dodosmail.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources and potentially also from external resources.

 

The vulnerabilities are confirmed in version 2.1. Other versions may also be affected.

 

Solution:

Edit the source code to ensure that input is properly verified.

Posted

Thanks Thomas.

 

Any help out there on making the input "properly verified"? (whatever that means)

 

I wish I could find a good, secure, free form script. Emphasis on free. Double-emphasis on secure.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...