Security Hotfix: vBDonate v1.2.2

Fillip H.

Staff member
Owner
Developer
Hey all,

Thanks to BugAbuse we've been able to identify and fix a potential SQL Injection exploit in the Lite and Pro versions of vBDonate v1.2.2.

You can either re-download v6.0.8 and re-upload /dbtech/vbdonate/actions/dodonate.php file directly within the upload folder, or you can apply manual file edits.

For the manual file edit, open up /dbtech/vbdonate/actions/dodonate.php within your forum directory and find:
PHP:
$dbt_vbd_donate_params = explode('|', $db->escape_string($vbulletin->GPC['amount']));

Replace with:
PHP:
$dbt_vbd_donate_params = explode('|', $vbulletin->GPC['amount']);

Find:
PHP:
$dbt_vbd_donate_amount = $db->escape_string($vbulletin->GPC['amount']);

Replace with:
PHP:
$dbt_vbd_donate_amount = $vbulletin->GPC['amount'];


Find both instances of:
Code:
" . $db->escape_string($dbt_vbd_donate_amount) . ",

Replace both instances with:
Code:
'" . $db->escape_string($dbt_vbd_donate_amount) . "',


Sorry for the inconvenience, and thank you for your continued support :)

Discuss this news here.
 
Back
Top