/* CRLF INJECTION/HTTP RESPONSE SPLIT */$pat='((\%0d)|(\%0a)|(\\\r)|(\\\n))';if (isset($_SERVER['QUERY_STRING'])) { if (preg_match("/$pat/", $_SERVER['QUERY_STRING'])) { die( 'Possible CRLF injection/HTTP response split.' ); }}if (isset($_COOKIE)) { if (preg_match("/$pat/", serialize($_COOKIE))) { die( 'Possible CRLF injection/HTTP response split.' ); }}unset($pat);
You must added it in includes/Core/security.php
Quote from: datahell on May 17, 2007, 21:18:48You must added it in includes/Core/security.phpWherever in there?
You could also add a relative filter at Elxis Defender instead of patching security.php.