Hi Kevin,

> For anybody who falls on this bug, PHP MUST BE disabled where hypermail
> outputs its files, or i guess someone can hack you by sending php files
> to the list and you will host those backdoors..!

how is this going to work? The first line that hypermail writes contains
"<?xml", and if 'short_tags = On', the PHP interpreter will already die
here.

If 'short_tags = Off', PHP will simply copy this line to its output and
continue. But as all special characters in the mail are escaped, how
could an attacker insert a string like '<?php' to execute code?


Regards,

Jan

Attachment: signature.asc
Description: Digital signature

Reply via email to