1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

XenForo 1.3.7 Released (Security Fix)

Discussion in 'Announcements' started by XenForo, Jun 23, 2015.

  1. XenForo

    XenForo Company Info Staff Member

    Today, we are releasing XenForo 1.3.7 to address two potential security vulnerabilities. We recommend that all customers running XenForo 1.3 upgrade to 1.3.7 or use the attached patch file as soon as possible.

    The two issues are XSS vulnerabilities. XSS (Cross Site Scripting) issues allow scripts and malicious HTML to be injected into the page, potentially allowing data theft or unauthenticated access.
    • In the notices system, the name token was not escaped as expected. This could allow specially crafted requests to trigger an XSS for guests (or for a registered user to trigger an XSS on themselves).
    • In the filter list system in the admin control panel, dynamic highlighting when filtering did not escape output properly, potentially triggering an XSS against the user viewing the page.
    Thanks to Diego Palacios for reporting these two issues.

    Applying a Fix: Upgrading
    You may upgrade to 1.3.7 to fix this issue. You should upgrade as you would to any other release.

    Customers with an active license may download 1.3.7 from their customer area. Full details for how to install and upgrade XenForo can be found in the XenForo Manual.

    Applying a Fix: Patching
    Alternatively, this issue can be fixed by applying the patch in the attached file. You should simply overwrite the following files with the versions attached to this message:
    • js/xenforo/filter_list.js
    • js/xenforo/full/filter_list.js
    • library/XenForo/ViewRenderer/HtmlPublic.php
    The files can be found at the same path within the attachment.

    Attached Files:

    Abracadaniel, Eagle, Amaury and 6 others like this.

Share This Page