Verifica daca ai declarata functia
phpbb_clean_username() in fisierul
includes/functions.php
De ce lipseste?
Poate n-ai actualizat complet forumul la versiunea phpBB 2.0.11:
Cod: Selectaţi tot
#
#-----[ OPEN ]---------------------------------------------
#
includes/functions.php
#
#-----[ FIND ]---------------------------------------------
# Line 80
//
// Get Userdata, $user can be username or user_id. If force_str is true, the username will be forced.
//
#
#-----[ BEFORE, ADD ]---------------------------------------------
#
// added at phpBB 2.0.11 to properly format the username
function phpbb_clean_username($username)
{
$username = htmlspecialchars(rtrim(trim($username), "\\"));
$username = substr(str_replace("\\'", "'", $username), 0, 25);
$username = str_replace("'", "\\'", $username);
return $username;
}
#
#-----[ FIND ]---------------------------------------------
# Line 96
$user = trim(htmlspecialchars($user));
$user = substr(str_replace("\\'", "'", $user), 0, 25);
$user = str_replace("'", "\\'", $user);
#
#-----[ REPLACE WITH ]---------------------------------------------
#
$user = phpbb_clean_username($user);
Poate n-ai Attachment Mod actualizat la 2.3.11:
viewtopic.php?t=210
Pentru a descărca noua versiune, citeşte primul mesaj din acest subiect.
Schimbările survenite de la versiunea 2.3.10
# fixed bug in GD/Imagick-Detection (on some installations thumbnailing images did not work)
# Added mysql index to attachment table for larger boards
# updated pre-edited files to be compatible with phpBB 2.0.11
# changed order of uploading files, resulting in hopefully getting the correct filesizes if the server does not allow file access outside the working directory
# added check for config table constant to update script
# fixed overwriting of group_id in admin_groups if Categories Hirarchie mod is installed
# fixed bugs regarding the 4GB limits users experienced
# fixed deletion of thumbnails
# fixed directory traversal injection (high severity) - Paul Laudanski (AKA Zhen-Xjell)
With this an attacker could be able to add/remove/execute files outside of the upload directory
# fixed multiple file extensions vulnerability (high severity) - Jeremy Bae at STG Security, Inc.
Due to the handling of mod_mime on multiple extensions an attacker is able to upload arbitrary script files to the web server.