Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130121124231.5b5304a8@project-mindstorm.net>
Date: Mon, 21 Jan 2013 12:42:31 +0100
From: Milan Berger <m.berger@...ject-mindstorm.net>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request - Wordpress 3.5 Full-path disclosure
 vulnerability

Hi,

> The issue can be seen only when PHP's display_errors is set to On.
> I have setup a default installation of wordpress 3.5 to display the
> issue. It can be accessed via the URL:
> http://blog.gilgalab.com.br/?s[]=1

this is a configuration error on your side, not on wordpress' one.



-- 
Kind Regards

Milan Berger
Project-Mindstorm Technical Engineer

---
project-mindstorm.net
Fruehlingstrasse 4 
90537 Feucht
Germany

Mob.: +49 176 22 98 76 02

https://www.ghcif.de
http://www.nopaste.info (for sale)
https://www.digital-bit.ch
http://www.project-mindstorm.net


twitter: http://twitter.com/twit4c

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.