http://squid4duck.org/ - security attack was stopped!

http://squid4duck.org/ - security attack was stopped!


Total impact: 5
Affected tags: xss, csrf

Variable: COOKIE.memberSession | Value: kMq?bepA4cY7fbx=7,cW4,NHvKQbVXLZ
Impact: 5 | Tags: xss, csrf
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23

REMOTE_ADDR: 109.32.60.14 HTTP_X_FORWARDED_FOR: HTTP_CLIENT_IP: SCRIPT_FILENAME: /home/squid/public_html/flash/XML.php QUERY_STRING: module=chat&action=RzChatSummary&value=11 REQUEST_URI: /flash/XML.php?module=chat&action=RzChatSummary&value=11 QUERY_STRING: module=chat&action=RzChatSummary&value=11 SCRIPT_NAME: /flash/XML.php PHP_SELF: /flash/XML.php
Quote · 3 Apr 2011

This issue has been answered a few times around here, the latest one you would find in second page of forums, from today:

http://www.boonex.com/unity/forums/#topic/Security-attack-was-stopped--2011-04-03.htm

Regards,

Sleepless
Quote · 3 Apr 2011

Yawwwwwwwwwwwwnnnnnnnnnnnnn

My opinions expressed on this site, in no way represent those of Boonex or Boonex employees.
Quote · 3 Apr 2011

 

Yawwwwwwwwwwwwnnnnnnnnnnnnn

Agreed....missing some emotion around here....lollll

Sleepless
Quote · 3 Apr 2011

Maybe Boonex should apply some of this security to help with their supposed ddos attacks? (lol).

http://towtalk.net ... Hosted by Zarconia.net!
Quote · 3 Apr 2011

 

Maybe Boonex should apply some of this security to help with their supposed ddos attacks? (lol).

it's needed only for process input strings! DOS attack it's a different boonex's trouble :)

PS: If possible do not write me personally, please try to ask on the forum first
Quote · 4 Apr 2011
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.