|
Message-ID: <20130121124231.5b5304a8@project-mindstorm.net> Date: Mon, 21 Jan 2013 12:42:31 +0100 From: Milan Berger <m.berger@...ject-mindstorm.net> To: oss-security@...ts.openwall.com Subject: Re: CVE Request - Wordpress 3.5 Full-path disclosure vulnerability Hi, > The issue can be seen only when PHP's display_errors is set to On. > I have setup a default installation of wordpress 3.5 to display the > issue. It can be accessed via the URL: > http://blog.gilgalab.com.br/?s[]=1 this is a configuration error on your side, not on wordpress' one. -- Kind Regards Milan Berger Project-Mindstorm Technical Engineer --- project-mindstorm.net Fruehlingstrasse 4 90537 Feucht Germany Mob.: +49 176 22 98 76 02 https://www.ghcif.de http://www.nopaste.info (for sale) https://www.digital-bit.ch http://www.project-mindstorm.net twitter: http://twitter.com/twit4c
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.