Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest stationmaster buy cloud host technology Hall
Today, a number of forums have been exploded vulnerability problem: discuz! 5.5 Cross-site patching [for 0324]
As the forum is dealing with discuz! Code, there is no strict filtering of user input, which can cause some users to use this BUG to publish malicious code.
When viewing this kind of post, malicious code will pose a threat to members of the forum who use IE, and not to FireFox and other browser users.
To prevent the members of your site from being harassed by such malicious code, please amend it according to the following methods:
Patching method A: manual modification
Open include/discuzcode.func.php
Found it
Copy Content to Clipboard
Code:
The following are the referenced contents:
"/\[align= ([^\[\<]+?) \]/i ",
"/\[float= ([^\[\<]+?) \]/i "modified to
Copy Content to Clipboard
Code:
The following are the referenced contents:
"/\[align= (left|center|right) \]/i",
"/\[float= (left|right) \]/i"
Problem patch complete.
The other is to increase the behavior of the jump code in the WYSIWYG form to prevent the method
You can read the data in DZ transcoding can be filtered out "expression" today many of the forum was burst into a loophole problem: discuz! 5.5 Cross-site patching [for 0324]