|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 61
Members: 0
Total: 61
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
tips for IPB <= 2.3.5 injection users |
|
Posted: Mon Jun 29, 2009 4:39 am |
|
|
mmouse |
Regular user |
|
|
Joined: Jun 29, 2009 |
Posts: 7 |
|
|
|
|
|
|
|
I have been noticing a lot of the same questions for this exploit, and i thought i would make a post to help out the people having them.
First, if you are unsure why you are always getting the message of bad target, are you running the new version 1.2?
If all you get is the patched message, first look here: .http://forums.invisionpower.com/topic/276512-ip-board-2-2-x-and-2-3-x-security-patch/
this patch can be applied without upgrading, and many siteops have done so, but not everyone, it was released in unison with acidroot's vulnerability release, so you can guess that DarkFig notified them, or they watch the security sites.
The next problem some have is even if the site is not patched, getting a problematic message, i've found that appending index.php? to my target url seems to work as well as leaving it alone with the trailing /. so try that as well.
if all else fails, throw the test post into your browser after the index.php? and you should get notfound if patched, and found if not patched
hope this helps someone |
|
|
|
|
|
www.waraxe.us Forum Index -> Invision Power Board
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|