* (s2Member) **Security fix**. It was possible for some of s2Member's code sample files to be executed directly. Not a proven vulnerability, but definitely NOT a good idea to allow this either. Fixed in this release, by renaming all `.php` files inside the `/includes/menu-pages/code-samples/` directory. These files now have a `.x-php` extension. As an additional line of defense, a new `.htaccess` file with `deny from all` is automatically placed inside the main `/s2member/includes/` directory. None of these files should be available pulicly anyway. s2Member's exsiting `realpath()` file scans remain in place too, which further prevents the direct execution of `.php` files.
Statistics: Posted by Jason Caldwell — October 1st, 2011, 8:00 pm
Statistics: Posted by Cristián Lávaque — September 29th, 2011, 2:00 am
Statistics: Posted by coloradoflyfisherman — September 27th, 2011, 4:34 pm