Greetings, Attached is a plugin that tests for an information leak vulnerability in Ultimate PHP Board. It bums a lot of code off of upb_code_injection (id=11671). I have some questions still: How are we dealing with OSVDB IDs? I defined it using script_xref(). Is that all right? In order to test it using the standalone nasl interpreter, I had to feed it the path where I had my test UPB installed, like so: foreach d (make_list("/my/install/dir", "/board", cgi_dirs())) Adding webmirror.nasl to the list of dependencies didn't help. Is that implicitly depended on? Does it not do anything when running from the standalone nasl interpreter? This is one of my first published plugins, so any nits are actually appreciated :) Thanks. Best regards, Erik Stephens www.edgeos.com Managed Vulnerability Assessment Services
This archive was generated by hypermail 2b30 : Sun Apr 04 2004 - 23:42:09 PDT