2015-08-30 at 8:10 PM UTC
SpectraL, are you taking notes?
2015-08-30 at 10:31 PM UTC
So the immediate answer is that it was the extension. If you happen to have a copy of vB5 you can see where it errors out in `VB_ROOT/core/includes/class_upload.php`, line 176. But you could just pick a different extension of course, this early error-out is just there to save transferring a large file just to reject it later. The larger security approach here is that only files with appropriate extensions can be uploaded and any file with one of those extensions is flagged to be served as a static (that is directly transmitted to the client, without invoking the PHP interpreter) so even if you get some custom script uploaded it will only be transferred as a literal file without ever running on the server. Two things I would think a blackhat would need to look out for is a mismatch between the upload whitelist and the "serve as static list". The former is encoded in that file I mentioned before, in the `is_valid_extension` method and the latter in the .htaccess files. A dev could add something to the former but not that latter and that could be a vulnerability. Alternatively some files like javascript are transferred as statics (the server never executes them) but can still be damaging if a client loads them, it's a possible vector for XSS. You have to weasel as `<script src="yourscript.bla">` into a page somehow and that may be possible with a script hosted by me rather than remotely but I can't think of a way to do it (it's possible url construction is non-unique, I've seen that used before, like user files are hosted from `/` so if a user uploads like "index.html" requests to `/index.html` could be routed to the statics first and allow for XSS. Building urls like that would be considered a fairly novice mistake but it still happens). But then maybe that's why I'm not a security professional.
2023-09-02 at 9:56 PM UTC
is this post about hacking forums? doesn't he require your password and admin name or do you use Lanny/1234 for your admin login?
The following users say it would be alright if the author of this
post didn't die in a fire!
2023-09-02 at 11:09 PM UTC
Oh I thought Sophie was back for a second.
2023-09-02 at 11:15 PM UTC
Originally posted by Chios Honey
is this post about hacking forums? doesn't he require your password and admin name or do you use Lanny/1234 for your admin login?
Yeah except I’d never use such an easy to guess password. That’d be super insecure. Instead I use a secure password, specifically “tedgrundersoneatsbabies”
The following users say it would be alright if the author of this
post didn't die in a fire!
2023-09-03 at 12:27 AM UTC
Chios is targeting pedos, messaged me some crazy shit.
2023-09-03 at 12:28 AM UTC
They also indicated they aren't alone.
2023-09-03 at 12:32 AM UTC
Also this is Aldra's doing.
2023-09-03 at 12:45 AM UTC
you are the forum gaslighter and nobody is falling for it , ya heard
2023-09-03 at 1:05 AM UTC
Lanny is easily in the top 100 of coolest members of our community.
2023-09-03 at 4:14 AM UTC
Originally posted by Speedy Parker
There is not 100 people here dumbass
That’s the joke you moron
The following users say it would be alright if the author of this
post didn't die in a fire!