Project

General

Profile

Revision a9f20108

Added by Sören Eberhardt-Biermann 10 months ago

- fixed vulnerability discovered by ADLab of Venustech (command injection, but requires admin access)
- webdav display UPPER/CASE/FULL/PATH with some webdav client
- standalone extplorer webdav does not work with PHP7
- CVE-2016-4313: archive path traversal vulnerability in extplorer 2.1.9
- #202 Users with read only permissions should not be able to extract archives.
- added indonesian language files

View differences:

extplorer.xml
1 1
<?xml version="1.0" encoding="iso-8859-1" ?>
2 2
<mosinstall type="component">
3 3
<!-- Joomla! 1.0 Installer XML File 
4
$Id: extplorer.xml 247 2016-02-23 10:06:18Z soeren $ -->
4
$Id: extplorer.xml 249 2016-12-11 16:11:03Z soeren $ -->
5 5
    <name>eXtplorer</name>
6
    <creationDate>15.03.2016</creationDate>
6
    <creationDate>22.06.2017</creationDate>
7 7
    <author>soeren, QuiX Project</author>
8 8
    <copyright>Soeren Eberhardt-Biermann, QuiX Project</copyright>
9 9
    <authorEmail>info|-at|-extplorer.net</authorEmail>
10 10
    <authorUrl>http://extplorer.net/</authorUrl>
11
    <version>2.1.9</version>
11
    <version>2.1.10</version>
12 12
    <description><![CDATA[
13 13
	<div align="left"><img src="components/com_extplorer/images/eXtplorer_logo.png" alt="eXtplorer Logo" /></div>
14 14
	<h2>Successfully installed eXtplorer&nbsp;</h2>

Also available in: Unified diff