Program: Postnuke Rogue release (0.72) (Latest). HomePage: www.Postnuke.com/.org Description: PostNuke is a weblog/Content Management System (CMS). Whilst PostNuke is a fork of PHP-Nuke, the entire core of the product has been replaced, making it far more secure and stable, and able to work in high-volume environments with ease. Some of the highlights of PostNuke are customisation of all aspects of the website's appearance through themes, including CSS support the ability to specify items as being suitable for either a single or all languages the best guarantee of displaying your webpages on all browsers due to HTML 4.01 transitional compliance a standard API and extensive documentation to allow for easy creation of extended functionality through modules and blocks Problem: The XSS was found fixed on postnuke's own website, but not in their code available for download. I have previously mentioned it on bugtraq too: http://online.securityfocus.com/archive/1/293813 Recently a friend emailed and informed me that his latest build still has same problem, which I mentioned in my earlier post. I thought since it was fixed on postnuke's own website then probably it'd be patched in their latest build too. I just checked it again by downloading and building fresh postnuke. The popup still comes, along with DB error. Exploit: http://ip.ad.dr.ess/postnuke/html/modules.php?op=modload&name=News&file=article&sid=