2009/1/20 Matthew Toseland <toad at amphibian.dyndns.org>:
> On Monday 19 January 2009 19:42, Florent Daigni?re wrote:
>> * Matthew Toseland <toad at amphibian.dyndns.org> [2009-01-19 13:02:31]:
>>
>> > There were at least:
>> > - A lack of validation on the captchas page which enabled collecting users
> IP
>> > addresses. This involved putting newlines into the headers in order to
> send
>> > extra headers and in particular redirects, and was actively exploited by
>> > nextgens to collect IP addresses.
>>
>> Unless you can prove it that's defamation ;)
>
> Then I retract it ... but I'm fairly sure this bug is exploitable, that's the
> point. :)

Not sure if you are seeing the same problem.
The only leak I am aware of is related to HTML injection, which is
fixable with a few lines of code.

(Which I have never tell SomeDude....  If you know any off-the-freenet
way to send SomeDude
 message, please tell me........... for example: gpg-encrypted message
posted on pastebin? )

Or do you means something  HTTP Request Smuggling-like?

--

Reply via email to