Case 3492
Remove dependency on unserialize() for admin table sorting
=== Severity Level ===
Important
=== Description ===
Object Injection Attack.
An attacker, once authenticated into the admin area of the product, could leverage user input passed to unserialize() to execute arbitrary PHP.
Yea, atleast they're fixing things.Oh gosh.... here we go yet again!!
Very true. I believe that they came out with this bug and not some third party?Yea, atleast they're fixing things.
Very true, but you have to realize for bigger companies, this may not be the case.So the only security exploit that was patched was one that allows admin to run PHP code on my server? Considering all of the admins in my WHMCS have root access to the server already this is not a huge concern.
Hell, we have a small staff, and it's not the case with us, either. I'm the only one with full WHMCS privs (Fran doesn't even have a login, although he and I are the only two with keys on that box). Though granted, we don't bring anyone onboard as staff unless we're willing to put a LOT of trust into them anyways.Very true, but you have to realize for bigger companies, this may not be the case.
No there is more... Read the blog post.So the only security exploit that was patched was one that allows admin to run PHP code on my server? Considering all of the admins in my WHMCS have root access to the server already this is not a huge concern.
Hopefully...Hopefully this one is the last one.. fixes the issues!
I love the comments to this blog post!they new update http://blog.whmcs.com/?t=82298