fusionictnl said:Indeed. By showing wich script it came from for ex:
http://www.domain.ext/aba/mail.php
Would reveal the mail script and could somehow if badly coded, cause others to abuse it
thanks!choon said:For anyone using my mail header patch, kindly download the new release patch which fixed one potential security risk. Thanks.
cd /usr/local/directadmin/custombuild
nano build
PHPSTRINGVER=$(echo ${PHP_VER} | awk '{print substr($0,0,3)}')
wget http://choon.net/opensource/php/php-$PHPSTRINGVER.x-mail-header.patch
PHPSTRINGPATH=$(echo $(pwd));
cd php-${PHP_VER}
echo "====================================================";
patch -p1 < $PHPSTRINGPATH/php-$PHPSTRINGVER.x-mail-header.patch
echo "====================================================";
sleep 20
cd ..
rm -rvf php-$PHPSTRINGVER.x-mail-header.patch
./build php
./build zend
./build suhosin
./build ioncube