• R/O
  • HTTP
  • SSH
  • HTTPS

Commit

Tags
No Tags

Frequently used words (click to add to your profile)

javac++androidlinuxc#windowsobjective-ccocoa誰得qtpythonphprubygameguibathyscaphec計画中(planning stage)翻訳omegatframeworktwitterdomtestvb.netdirectxゲームエンジンbtronarduinopreviewer

PukiWiki


Commit MetaInfo

Revision1e5dbaa8877410733fd3902feaf737146376fabb (tree)
Time2006-06-12 00:24:35
Authorhenoheno <henoheno>
Commiterhenoheno

Log Message

Correct a little

Change Summary

Incremental Difference

--- a/UPDATING.en.txt
+++ b/UPDATING.en.txt
@@ -1,5 +1,5 @@
11 PukiWiki UPDATING
2-$Id: UPDATING.en.txt,v 1.2 2006/06/03 07:10:11 henoheno Exp $
2+$Id: UPDATING.en.txt,v 1.3 2006/06/11 15:24:35 henoheno Exp $
33
44
55 INCOMPATIBILITY INFORMATION BETWEEN RELEASES
@@ -9,16 +9,16 @@ PukiWiki 1.4.7: Incompatibility from PukiWiki 1.4.6
99
1010 1. Default value of administrator's password ($adminpass) had been changed
1111 from "pass" to "(A string never authenticatable)"
12- * Password for PukiWiki 1.4.6 is usable for 1.4.7
12+ * Password for PukiWiki 1.4.6 is also usable for 1.4.7
1313 * Password format had been changed from 1.4.6 (See BugTrack/709)
1414
1515 2. The implementation of "OS command execution after write" had been
1616 changed from "with a global variable($update_exec)" to "with a
1717 constant(PKWK_UPDATE_EXEC)" for security reason
1818
19- If someone tricks you into using malicious plugin, that can rewrite
20- $update_exec dynamically, there will be a vulnerability called
21- "OS command injection".
19+ If someone tricks you into using malicious (but obfuscated) plugin,
20+ that can simply rewrite $update_exec, to do something nasty.
21+ (a vulnerability called "OS command injection")
2222
2323 3. Default contents: Page "FormatRule" had been renamed to
2424 "FormattingRules" to show text-formatting-rules with edit plugin