Deutsch   English   Français   Italiano  
<20250712205507.6a4eda98@ryz.dorfdsl.de>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: nntp.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: Marco Moock <mm@dorfdsl.de>
Newsgroups: news.admin.peering
Subject: Re: Is Rocksolid Light really compromised and insecure?
Date: Sat, 12 Jul 2025 20:55:07 +0200
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <20250712205507.6a4eda98@ryz.dorfdsl.de>
References: <104tuhe$2r60t$1@paganini.bofh.team>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 12 Jul 2025 20:55:08 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="7b23cd492e5550348a224f9d5902b933";
	logging-data="2420708"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+DhN/XvfBjucr4Nzt7Gaft"
Cancel-Lock: sha1:DD8KGP1onzHcOIFerCjavb+7AZI=
X-Newsreader: Claws Mail 4.3.1 (GTK 3.24.49; x86_64-pc-linux-gnu)

On 12.07.2025 10:21 Uhr Anonymous wrote:

> Some have claimed that Rocksolid Light is insecure. They have claimed
> that there are many vulnerabilities in the codebase. They have
> claimed that Rocksolid Light should not be used or peered.
> 
> Yet I have not seen a single supposed vulnerability demonstrated.
> 
> I have not seen any CVE filings.
> 
> Can anyone demonstrate and prove any of the claimed exploits?

It least older versions were vulnerable to SQL injections that made
creating files in the spool directory possible. The files.php file also
seems vulnerable to such attacks.

-- 
kind regards
Marco

Send spam to 1752308479muell@stinkedores.dorfdsl.de