<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[ispCP - Board - Support - Security Advisories]]></title>
		<link>http://www.isp-control.net/forum/</link>
		<description><![CDATA[ispCP - Board - Support - http://www.isp-control.net/forum]]></description>
		<pubDate>Mon, 18 May 2026 05:39:12 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[[Solved] Bug PHP]]></title>
			<link>http://www.isp-control.net/forum/thread-16031.html</link>
			<pubDate>Tue, 08 May 2012 09:01:48 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-16031.html</guid>
			<description><![CDATA[Good morning, this bug detected in our engine we use php for even a bush in 5.2 may be a problem for our servers.<br />
<br />
Any partner I may say something<br />
<br />
<br />
PHP 5.3.12/5.4.2 do not fix all variations of the CGI issues described in CVE-2012-1823. It has also come to our attention that some sites use an insecure cgiwrapper script to run PHP. These scripts will use &#36;* instead of "&#36;@" to pass parameters to php-cgi which causes a number of issues. Again, people using mod_php or php-fpm are not affected.<br />
<br />
One way to address these CGI issues is to reject the request if the query string contains a '-' and no '='. It can be done using Apache's mod_rewrite like this:<br />
<br />
    RewriteCond %{QUERY_STRING} ^[^=]*&#36;<br />
    RewriteCond %{QUERY_STRING} %2d|\- [NC]<br />
    RewriteRule .? - [F,L]<br />
    <br />
Note that this will block otherwise safe requests like ?top-40 so if you have query parameters that look like that, adjust your regex accordingly.<br />
Another set of releases are planned for Tuesday, May, 8th. These releases will fix the CGI flaw and another CGI-related issue in apache_request_header (5.4 only).<br />
<br />
We apologize for the inconvenience created with these releases and the (lack of) communication around them.]]></description>
			<content:encoded><![CDATA[Good morning, this bug detected in our engine we use php for even a bush in 5.2 may be a problem for our servers.<br />
<br />
Any partner I may say something<br />
<br />
<br />
PHP 5.3.12/5.4.2 do not fix all variations of the CGI issues described in CVE-2012-1823. It has also come to our attention that some sites use an insecure cgiwrapper script to run PHP. These scripts will use &#36;* instead of "&#36;@" to pass parameters to php-cgi which causes a number of issues. Again, people using mod_php or php-fpm are not affected.<br />
<br />
One way to address these CGI issues is to reject the request if the query string contains a '-' and no '='. It can be done using Apache's mod_rewrite like this:<br />
<br />
    RewriteCond %{QUERY_STRING} ^[^=]*&#36;<br />
    RewriteCond %{QUERY_STRING} %2d|\- [NC]<br />
    RewriteRule .? - [F,L]<br />
    <br />
Note that this will block otherwise safe requests like ?top-40 so if you have query parameters that look like that, adjust your regex accordingly.<br />
Another set of releases are planned for Tuesday, May, 8th. These releases will fix the CGI flaw and another CGI-related issue in apache_request_header (5.4 only).<br />
<br />
We apologize for the inconvenience created with these releases and the (lack of) communication around them.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Security Announcement: Backup Restore Manager]]></title>
			<link>http://www.isp-control.net/forum/thread-11536.html</link>
			<pubDate>Sun, 29 Aug 2010 15:23:40 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-11536.html</guid>
			<description><![CDATA[Today another critical security issue has been found. All ispCP Omega versions are effected.<br />
It is possible to use the ispCP Client Backup Manager to restore forged backups and - in worst case - gain control over the server system.<br />
<br />
We <span style="font-weight: bold;">strongly</span> recommend to fix the described security issue by disabling the backup restore routine. For this open the ispcp-dmn-mngr in /var/www/ispcp/engine/ and search for<br />
<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>sub dmn_restore_data {</code></div></div>
<br />
add<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>exit 1;</code></div></div>
<br />
directly in the next line.<br />
<br />
We try to deliver a patch as fast as possible. You can follow the status in ticket: <a href="http://isp-control.net/ispcp/ticket/2440" target="_blank">2440</a>]]></description>
			<content:encoded><![CDATA[Today another critical security issue has been found. All ispCP Omega versions are effected.<br />
It is possible to use the ispCP Client Backup Manager to restore forged backups and - in worst case - gain control over the server system.<br />
<br />
We <span style="font-weight: bold;">strongly</span> recommend to fix the described security issue by disabling the backup restore routine. For this open the ispcp-dmn-mngr in /var/www/ispcp/engine/ and search for<br />
<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>sub dmn_restore_data {</code></div></div>
<br />
add<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>exit 1;</code></div></div>
<br />
directly in the next line.<br />
<br />
We try to deliver a patch as fast as possible. You can follow the status in ticket: <a href="http://isp-control.net/ispcp/ticket/2440" target="_blank">2440</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Critical security issue]]></title>
			<link>http://www.isp-control.net/forum/thread-11531.html</link>
			<pubDate>Sun, 29 Aug 2010 10:35:12 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-11531.html</guid>
			<description><![CDATA[Backup engine can be used to upload a symlink to an arbitrary file. Of course, that file must be accessible and readable for vuxxxx user resulting a minor issue.<br />
Ex:<br />
download last available backup<br />
unpack<br />
create in htdocs a simlink to /etc/passwd<br />
upload in backup folder<br />
call <a href="http://site.tld/symlink_name" target="_blank">http://site.tld/symlink_name</a> and you will get passwd.<br />
<br />
PS. My trac account is unusable that’s why I use forum.]]></description>
			<content:encoded><![CDATA[Backup engine can be used to upload a symlink to an arbitrary file. Of course, that file must be accessible and readable for vuxxxx user resulting a minor issue.<br />
Ex:<br />
download last available backup<br />
unpack<br />
create in htdocs a simlink to /etc/passwd<br />
upload in backup folder<br />
call <a href="http://site.tld/symlink_name" target="_blank">http://site.tld/symlink_name</a> and you will get passwd.<br />
<br />
PS. My trac account is unusable that’s why I use forum.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[ispCP Omega 1.0.5 Security Announcement II]]></title>
			<link>http://www.isp-control.net/forum/thread-11269.html</link>
			<pubDate>Thu, 29 Jul 2010 22:20:15 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-11269.html</guid>
			<description><![CDATA[Dear all,<br />
<br />
Today we discovered another potential fault, this time in the ispCP Omega Engine. This security fix only affects installations where DEBUG is switched on in ispcp.conf. By default this functionality is disabled, if you have not enabled it then this security announcement does not affect you.<br />
<br />
The details of the security fix are, on Database backup the password for the ispCP database user is revealed and logged in clear text without obfuscation.<br />
<br />
To secure your installation, it is recommended to either set DEBUG to 0 or use the<br />
patch attached to ticket <a href="http://isp-control.net/ispcp/ticket/2411" target="_blank">2411</a>.<br />
<br />
We apologise for any inconvenience caused.]]></description>
			<content:encoded><![CDATA[Dear all,<br />
<br />
Today we discovered another potential fault, this time in the ispCP Omega Engine. This security fix only affects installations where DEBUG is switched on in ispcp.conf. By default this functionality is disabled, if you have not enabled it then this security announcement does not affect you.<br />
<br />
The details of the security fix are, on Database backup the password for the ispCP database user is revealed and logged in clear text without obfuscation.<br />
<br />
To secure your installation, it is recommended to either set DEBUG to 0 or use the<br />
patch attached to ticket <a href="http://isp-control.net/ispcp/ticket/2411" target="_blank">2411</a>.<br />
<br />
We apologise for any inconvenience caused.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[ispCP Omega 1.0.5 Security Announcement]]></title>
			<link>http://www.isp-control.net/forum/thread-11226.html</link>
			<pubDate>Fri, 23 Jul 2010 12:02:36 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-11226.html</guid>
			<description><![CDATA[Dear ispCP Users ;<br />
<br />
Today, a new security hole was discovered in ispCP stable release.<br />
<br />
This security hole allows your customers to connect to the database (pma) from other customers by passing arbitrary identifiers in the URL via the <span style="font-weight: bold;">client/sql_auth.php</span> script.<br />
<br />
For better information, and to learn how to fix this security hole, you can read the following ticket:<br />
<br />
<a href="http://isp-control.net/ispcp/ticket/2410" target="_blank">http://isp-control.net/ispcp/ticket/2410</a><br />
<br />
<span style="font-weight: bold;">Note:</span> This security hole also affect all prior versions of ispCP ω that implement the <span style="font-weight: bold;">client/sql_auth.php script</span>.<br />
<br />
Best Regards :<br />
<hr />
<br />
<span style="font-weight: bold;">Edit:</span><br />
<br />
See <a href="http://isp-control.net/ispcp/ticket/2410#comment:9" target="_blank">http://isp-control.net/ispcp/ticket/2410#comment:9</a> for a quick fix.]]></description>
			<content:encoded><![CDATA[Dear ispCP Users ;<br />
<br />
Today, a new security hole was discovered in ispCP stable release.<br />
<br />
This security hole allows your customers to connect to the database (pma) from other customers by passing arbitrary identifiers in the URL via the <span style="font-weight: bold;">client/sql_auth.php</span> script.<br />
<br />
For better information, and to learn how to fix this security hole, you can read the following ticket:<br />
<br />
<a href="http://isp-control.net/ispcp/ticket/2410" target="_blank">http://isp-control.net/ispcp/ticket/2410</a><br />
<br />
<span style="font-weight: bold;">Note:</span> This security hole also affect all prior versions of ispCP ω that implement the <span style="font-weight: bold;">client/sql_auth.php script</span>.<br />
<br />
Best Regards :<br />
<hr />
<br />
<span style="font-weight: bold;">Edit:</span><br />
<br />
See <a href="http://isp-control.net/ispcp/ticket/2410#comment:9" target="_blank">http://isp-control.net/ispcp/ticket/2410#comment:9</a> for a quick fix.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[ispCP Omega 1.0.3 Security Announcement]]></title>
			<link>http://www.isp-control.net/forum/thread-8926.html</link>
			<pubDate>Thu, 24 Dec 2009 01:32:22 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-8926.html</guid>
			<description><![CDATA[Sometimes not even the best testing help to find all remaining bugs in software and this time it's a security issue we overlooked in ispCP ω 1.0.3.<br />
<br />
If you have already installed ispCP ω 1.0.3 on your server, get our <span style="font-weight: bold;">security fix</span>.<br />
Just follow these instructions (as root):<br />
<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code># cd /var/www/ispcp/engine/setup<br />
 # wget -O- 'http://www.isp-control.net/ispcp/raw-attachment/ticket/2112/permission-fix.tar.gz' | tar -xzv<br />
 # ./set-gui-permissions.sh<br />
 # ./set-engine-permissions.sh</code></div></div>
<br />
Else if you have not yet installed ispCP ω 1.0.3, please proceed to our downloads page and download the latest released version of <span style="font-weight: bold;">ispCP ω 1.0.3-1</span>. An update is strongly recommended, because all prior versions of ispCP ω contain this security hole.<br />
Beside the security fix ispCP ω 1.0.3-1 eliminates those situations, where it was not possible to install ispCP Omega for some reason.<br />
<br />
ispCP ω 1.0.3-1 does not implement any new features or bugfixes. There is no need to install ispCP ω 1.0.3-1 on a running ispCP ω 1.0.3. (Please don't forget the security fix!)<br />
<br />
ispCP Omega is an open source solution to all your web hosting needs. You can download the latest stable release from the downloads section. Before you download ispCP, please browse through our comprehensive ispCP documentation section and review the System Requirements, Installing ispCP, Frequently Asked Questions and HowTo's.]]></description>
			<content:encoded><![CDATA[Sometimes not even the best testing help to find all remaining bugs in software and this time it's a security issue we overlooked in ispCP ω 1.0.3.<br />
<br />
If you have already installed ispCP ω 1.0.3 on your server, get our <span style="font-weight: bold;">security fix</span>.<br />
Just follow these instructions (as root):<br />
<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code># cd /var/www/ispcp/engine/setup<br />
 # wget -O- 'http://www.isp-control.net/ispcp/raw-attachment/ticket/2112/permission-fix.tar.gz' | tar -xzv<br />
 # ./set-gui-permissions.sh<br />
 # ./set-engine-permissions.sh</code></div></div>
<br />
Else if you have not yet installed ispCP ω 1.0.3, please proceed to our downloads page and download the latest released version of <span style="font-weight: bold;">ispCP ω 1.0.3-1</span>. An update is strongly recommended, because all prior versions of ispCP ω contain this security hole.<br />
Beside the security fix ispCP ω 1.0.3-1 eliminates those situations, where it was not possible to install ispCP Omega for some reason.<br />
<br />
ispCP ω 1.0.3-1 does not implement any new features or bugfixes. There is no need to install ispCP ω 1.0.3-1 on a running ispCP ω 1.0.3. (Please don't forget the security fix!)<br />
<br />
ispCP Omega is an open source solution to all your web hosting needs. You can download the latest stable release from the downloads section. Before you download ispCP, please browse through our comprehensive ispCP documentation section and review the System Requirements, Installing ispCP, Frequently Asked Questions and HowTo's.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[CSRF in all SquirrelMail forms]]></title>
			<link>http://www.isp-control.net/forum/thread-7534.html</link>
			<pubDate>Mon, 17 Aug 2009 19:52:48 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-7534.html</guid>
			<description><![CDATA[A few days ago, SquirrelMail announced an cross-site request forgery issue in all forms and versions below 1.4.20RC1 with the following text:<br />
<br />
<blockquote><cite>Quote:</cite>"All form submissions (send message, change preferences, etc.) in SquirrelMail were previously subject to cross-site request forgery (CSRF), wherein data could be sent to them from an offsite location, which could allow an attacker to inject malicious content into user preferences or possibly send emails without user consent."</blockquote>
<br />
To prevent your server from attacks, please use the updated <a href="https://sourceforge.net/projects/ispcp/files/ispCP%20Omega/ispCP%20Omega%201.0.0/ispcp-squirrelmail-1.4.20rc1.tar.gz/download" target="_blank">SquirrelMail package for ispCP Omega</a>. We recommend to update your SquirrelMail soon.<br />
<br />
The original announcement can be found in the <a href="http://www.squirrelmail.org/security/issue/2009-08-12" target="_blank">SquirrelMail homepage</a>.]]></description>
			<content:encoded><![CDATA[A few days ago, SquirrelMail announced an cross-site request forgery issue in all forms and versions below 1.4.20RC1 with the following text:<br />
<br />
<blockquote><cite>Quote:</cite>"All form submissions (send message, change preferences, etc.) in SquirrelMail were previously subject to cross-site request forgery (CSRF), wherein data could be sent to them from an offsite location, which could allow an attacker to inject malicious content into user preferences or possibly send emails without user consent."</blockquote>
<br />
To prevent your server from attacks, please use the updated <a href="https://sourceforge.net/projects/ispcp/files/ispCP%20Omega/ispCP%20Omega%201.0.0/ispcp-squirrelmail-1.4.20rc1.tar.gz/download" target="_blank">SquirrelMail package for ispCP Omega</a>. We recommend to update your SquirrelMail soon.<br />
<br />
The original announcement can be found in the <a href="http://www.squirrelmail.org/security/issue/2009-08-12" target="_blank">SquirrelMail homepage</a>.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Warning: bug found in *all* 2.4.x and 2.6.x kernels]]></title>
			<link>http://www.isp-control.net/forum/thread-7505.html</link>
			<pubDate>Fri, 14 Aug 2009 07:17:00 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-7505.html</guid>
			<description><![CDATA[A <a href="http://www.securityfocus.com/bid/36038/discuss" target="_blank">local privilege scalation exploitable bug has been found on *all* linux kernels from 2.4</a>. There are exploits out there, so beware!]]></description>
			<content:encoded><![CDATA[A <a href="http://www.securityfocus.com/bid/36038/discuss" target="_blank">local privilege scalation exploitable bug has been found on *all* linux kernels from 2.4</a>. There are exploits out there, so beware!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[No SquirrelMail Module Vulnerabilität in ispCP]]></title>
			<link>http://www.isp-control.net/forum/thread-7387.html</link>
			<pubDate>Mon, 03 Aug 2009 22:00:49 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-7387.html</guid>
			<description><![CDATA[Hi<br />
<br />
there were some problems on the squirrel website...<br />
here a german (heise) comment:<br />
<a href="http://www.heise.de/newsticker/Passwort-Module-von-SquirrelMail-infiltriert--/meldung/142979" target="_blank">http://www.heise.de/newsticker/Passwort-...ung/142979</a><br />
<br />
engl: <a href="http://www.h-online.com/security/SquirrelMail-password-modules-infiltrated--/news/113920" target="_blank">http://www.h-online.com/security/Squirre...ews/113920</a><br />
<br />
I don't know if we have bundled ispcp with one of theese modules. But I like the last sentence in the report...<br />
<br />
/J]]></description>
			<content:encoded><![CDATA[Hi<br />
<br />
there were some problems on the squirrel website...<br />
here a german (heise) comment:<br />
<a href="http://www.heise.de/newsticker/Passwort-Module-von-SquirrelMail-infiltriert--/meldung/142979" target="_blank">http://www.heise.de/newsticker/Passwort-...ung/142979</a><br />
<br />
engl: <a href="http://www.h-online.com/security/SquirrelMail-password-modules-infiltrated--/news/113920" target="_blank">http://www.h-online.com/security/Squirre...ews/113920</a><br />
<br />
I don't know if we have bundled ispcp with one of theese modules. But I like the last sentence in the report...<br />
<br />
/J]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[fixed] Update RC2 -> RC3: Do not use ispcp-update]]></title>
			<link>http://www.isp-control.net/forum/thread-2357.html</link>
			<pubDate>Fri, 08 Feb 2008 00:22:03 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-2357.html</guid>
			<description><![CDATA[<span style="font-weight: bold;">Only care about this if you've downloaded the RC3 Package before Feb. 08 2008 18:00 GMT.</span><br />
<br />
Due to the fact no one tested the update script from RC2 to RC3 there are a lot of errors revealed.<br />
<br />
<span style="font-weight: bold;">DO NOT USE THE UPDATE SCRIPT SHIPPED WITH RC3 TO UPDATE YOUR ispCP INSTALLATION FROM RC2 TO RC3.</span><br />
<br />
From VHCS to RC3 should make no problems.<br />
fix can be downloaded here: <a href="http://isp-control.net/downloads/hotfix1-rc3.tar.bz2" target="_blank">hotfix1-rc3.tar.bz2</a>.<br />
<br />
Extract the file to your ./ispcp/engine/ folder before you start the update!]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;">Only care about this if you've downloaded the RC3 Package before Feb. 08 2008 18:00 GMT.</span><br />
<br />
Due to the fact no one tested the update script from RC2 to RC3 there are a lot of errors revealed.<br />
<br />
<span style="font-weight: bold;">DO NOT USE THE UPDATE SCRIPT SHIPPED WITH RC3 TO UPDATE YOUR ispCP INSTALLATION FROM RC2 TO RC3.</span><br />
<br />
From VHCS to RC3 should make no problems.<br />
fix can be downloaded here: <a href="http://isp-control.net/downloads/hotfix1-rc3.tar.bz2" target="_blank">hotfix1-rc3.tar.bz2</a>.<br />
<br />
Extract the file to your ./ispcp/engine/ folder before you start the update!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[IMPORTANT: DOVECOT VULNERABILITY]]></title>
			<link>http://www.isp-control.net/forum/thread-2126.html</link>
			<pubDate>Thu, 10 Jan 2008 18:53:24 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-2126.html</guid>
			<description><![CDATA[All dovecot users with ldap dictionaries should update a.s.a.p<br />
<br />
See Debian DSA 1457-1 for more details.<br />
<br />
You should upgrade your dovecot packages also without using ldap dictionaries, but it's not that important then...]]></description>
			<content:encoded><![CDATA[All dovecot users with ldap dictionaries should update a.s.a.p<br />
<br />
See Debian DSA 1457-1 for more details.<br />
<br />
You should upgrade your dovecot packages also without using ldap dictionaries, but it's not that important then...]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[solved] Security Problem detected]]></title>
			<link>http://www.isp-control.net/forum/thread-1178.html</link>
			<pubDate>Fri, 17 Aug 2007 16:21:42 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-1178.html</guid>
			<description><![CDATA[Hi<br />
<br />
Platzwart had a problem on his server and mentioned that this could be a security issue:<br />
<br />
A customer can add a domain-alias, eg. gmx.net<br />
Then he adds an emailaddress for this domain: all@gmx.net<br />
and then he can add a catchall for gmx.net to go into this new mailbox.<br />
<br />
Well - all mails to gmx.net which are sent over this server (webmail, smtp...) will go to the customers account.<br />
I checked this and got an email to djkherjkghekj@gmx.net to my web.de account...<br />
<br />
This is *not really* good.... (better: this is really not good)<br />
<br />
What are others thinking about (besides opening a ticket)...<br />
<a href="http://www.isp-control.net/ispcp/ticket/573" target="_blank">http://www.isp-control.net/ispcp/ticket/573</a><br />
<br />
/Joximu]]></description>
			<content:encoded><![CDATA[Hi<br />
<br />
Platzwart had a problem on his server and mentioned that this could be a security issue:<br />
<br />
A customer can add a domain-alias, eg. gmx.net<br />
Then he adds an emailaddress for this domain: all@gmx.net<br />
and then he can add a catchall for gmx.net to go into this new mailbox.<br />
<br />
Well - all mails to gmx.net which are sent over this server (webmail, smtp...) will go to the customers account.<br />
I checked this and got an email to djkherjkghekj@gmx.net to my web.de account...<br />
<br />
This is *not really* good.... (better: this is really not good)<br />
<br />
What are others thinking about (besides opening a ticket)...<br />
<a href="http://www.isp-control.net/ispcp/ticket/573" target="_blank">http://www.isp-control.net/ispcp/ticket/573</a><br />
<br />
/Joximu]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Security vulnerability warning ispCP Omega 1.0.0 RC2]]></title>
			<link>http://www.isp-control.net/forum/thread-438.html</link>
			<pubDate>Tue, 24 Apr 2007 23:01:13 +0000</pubDate>
			<guid isPermaLink="false">http://www.isp-control.net/forum/thread-438.html</guid>
			<description><![CDATA[Raphael (atomo64) today posted a security vulnerability in our bug tracker.  We implemented as soon as possible a fix to solve this vulnerability.  As a result you can download the new release candidate RC2b.<br />
<br />
For fixing only the critical security bug, there is a patch available on <a href="http://downloads.sourceforge.net/ispcp/ispcp-omega-1.0.0-rc2-security-patch.txt" target="_blank">http://downloads.sourceforge.net/ispcp/i...-patch.txt</a><br />
With the next command you can install the patch:<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>patch -cl -d /var/www/ispcp &lt; /path/to/ispcp-omega-1.0.0-rc2-security-patch.txt</code></div></div>
<br />
To manually fix the security bug add the following line above in the file /var/www/ispcp/gui/include/sql.php immediately below the commented text (around line 20):<br />
<div class="codeblock phpcodeblock"><div class="title">PHP Code:<br />
</div><div class="body"><div dir="ltr"><code><span style="color: #0000BB">&#36;include_path&nbsp;</span><span style="color: #007700">=&nbsp;</span><span style="color: #0000BB">realpath</span><span style="color: #007700">(</span><span style="color: #0000BB">dirname</span><span style="color: #007700">(</span><span style="color: #0000BB">__FILE__</span><span style="color: #007700">));&nbsp;<br /></span></code></div></div></div>
<br />
We thank Raphael to reporting this security bug and we hope everyone using ispCP Omega will patch this bug.  To stay informed about security bugs and new releases, subscribe to our announce mailinglist.]]></description>
			<content:encoded><![CDATA[Raphael (atomo64) today posted a security vulnerability in our bug tracker.  We implemented as soon as possible a fix to solve this vulnerability.  As a result you can download the new release candidate RC2b.<br />
<br />
For fixing only the critical security bug, there is a patch available on <a href="http://downloads.sourceforge.net/ispcp/ispcp-omega-1.0.0-rc2-security-patch.txt" target="_blank">http://downloads.sourceforge.net/ispcp/i...-patch.txt</a><br />
With the next command you can install the patch:<br />
<div class="codeblock">
<div class="title">Code:<br />
</div><div class="body" dir="ltr"><code>patch -cl -d /var/www/ispcp &lt; /path/to/ispcp-omega-1.0.0-rc2-security-patch.txt</code></div></div>
<br />
To manually fix the security bug add the following line above in the file /var/www/ispcp/gui/include/sql.php immediately below the commented text (around line 20):<br />
<div class="codeblock phpcodeblock"><div class="title">PHP Code:<br />
</div><div class="body"><div dir="ltr"><code><span style="color: #0000BB">&#36;include_path&nbsp;</span><span style="color: #007700">=&nbsp;</span><span style="color: #0000BB">realpath</span><span style="color: #007700">(</span><span style="color: #0000BB">dirname</span><span style="color: #007700">(</span><span style="color: #0000BB">__FILE__</span><span style="color: #007700">));&nbsp;<br /></span></code></div></div></div>
<br />
We thank Raphael to reporting this security bug and we hope everyone using ispCP Omega will patch this bug.  To stay informed about security bugs and new releases, subscribe to our announce mailinglist.]]></content:encoded>
		</item>
	</channel>
</rss>