Hi Kevin, > For anybody who falls on this bug, PHP MUST BE disabled where hypermail > outputs its files, or i guess someone can hack you by sending php files > to the list and you will host those backdoors..!
how is this going to work? The first line that hypermail writes contains "<?xml", and if 'short_tags = On', the PHP interpreter will already die here. If 'short_tags = Off', PHP will simply copy this line to its output and continue. But as all special characters in the mail are escaped, how could an attacker insert a string like '<?php' to execute code? Regards, Jan
signature.asc
Description: Digital signature