Hi, I'm using Dolphin RC2 and when I'm trying to add an youtube video to an article, after i hit the post button, i receive the following message: "Possible security attack!!! All data has been collected and sent to the site owner for analysis"
And on my email I receive this:
Total impact: 26
Affected tags: xss, csrf, id, rfe
Variable: REQUEST.content | Value: <p>I guess almost
detailing fans heard about <strong>Paul
Daulton</strong>, the most expensive detailer worldwide.
He has a detailing package that cost <strong>5000
GBP</strong>. In the next clip, you will see how was
prepared a <strong>2008 Morgan
Aeromax</strong> by <strong>Paul
Daulton</strong> for a car show. Also,
<strong>Paul Dalton</strong> has a car was
made by <strong>Swissvax</strong>:
<strong>Swissvax Crystal
Rock</strong>.</p>
<p>&lt;object width=\"425\"
height=\"344\"&gt;&lt;param
name=\"movie\" value=\"http://www.youtube.com/v/OlDr0eBze2c&amp;color1=0xb1b1b1&amp;color2=0xcfcfcf&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1\"&gt;&lt;/param&gt;&lt;param name=\"allowFullScreen\"
value=\"true\"&gt;&lt;/param&gt;&lt;param
name=\"allowScriptAccess\"
value=\"always\"&gt;&lt;/param&gt;&lt;embed
src=\"http://www.youtube.com/v/OlDr0eBze2c&amp;color1=0xb1b1b1&amp;color2=0xcfcfcf&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1\"
type=\"application/x-shockwave-flash\"
allowfullscreen=\"true\"
allowScriptAccess=\"always\"
width=\"425\"
height=\"344\"&gt;&lt;/embed&gt;&lt;/object&gt;</p>
Impact: 13 | Tags: xss, csrf, id, rfe
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects JavaScript language constructs | Tags: xss, csrf, id, rfe | ID: 20
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Variable: POST.content | Value: <p>I guess almost
detailing fans heard about <strong>Paul
Daulton</strong>, the most expensive detailer worldwide.
He has a detailing package that cost <strong>5000
GBP</strong>. In the next clip, you will see how was
prepared a <strong>2008 Morgan
Aeromax</strong> by <strong>Paul
Daulton</strong> for a car show. Also,
<strong>Paul Dalton</strong> has a car was
made by <strong>Swissvax</strong>:
<strong>Swissvax Crystal
Rock</strong>.</p>
<p>&lt;object width=\"425\"
height=\"344\"&gt;&lt;param
name=\"movie\" value=\"http://www.youtube.com/v/OlDr0eBze2c&amp;color1=0xb1b1b1&amp;color2=0xcfcfcf&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1\"&gt;&lt;/param&gt;&lt;param name=\"allowFullScreen\"
value=\"true\"&gt;&lt;/param&gt;&lt;param
name=\"allowScriptAccess\"
value=\"always\"&gt;&lt;/param&gt;&lt;embed
src=\"http://www.youtube.com/v/OlDr0eBze2c&amp;color1=0xb1b1b1&amp;color2=0xcfcfcf&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1\"
type=\"application/x-shockwave-flash\"
allowfullscreen=\"true\"
allowScriptAccess=\"always\"
width=\"425\"
height=\"344\"&gt;&lt;/embed&gt;&lt;/object&gt;</p>
Impact: 13 | Tags: xss, csrf, id, rfe
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects JavaScript language constructs | Tags: xss, csrf, id, rfe | ID: 20
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
REMOTE_ADDR: 89.136.155.238
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME: /home/pushtiul/public_html/modules/index.php
QUERY_STRING: r=articles/admin/
REQUEST_URI: /m/articles/admin/
QUERY_STRING: r=articles/admin/
SCRIPT_NAME: /modules/index.php
PHP_SELF: /modules/index.php
I've searched about a fix, and I saw that my files from RC2 are already modified like the ticket who show how to fix this problem. I don't know what to do. Can you help me please?
Thank you!