NukeSentinel 2.5.05:<br>Code: if(!ereg("([0-9]{1,3})\\.([0-9]{1,3})\\.([0-9]{1,3})\\.([0-9]{1,3})",<br>$nsnst_const['remote_ip'])) {$nsnst_const['remote_ip'] = "none"; }<br>Results: File Disclosure (with a nice sql injection) + SQL Injection (includes/nsbypass.php)
<br><br>NukeSentinel 2.5.06 (they added ^ but they forgot to add $):<br>Code: if(!ereg("^([0-9]{1,3})\\.([0-9]{1,3})\\.([0-9]{1,3})\\.([0-9]{1,3})",<span style="font-family: monospace;"><br></span>$nsnst_const['remote_ip'])) {$nsnst_const['remote_ip'] = "none"; }
<br>Results: SQL Injection (includes/nukesentinel.php / includes/nsbypass.php)<br><br>NukeSentinel 2.5.07 (includes/nukesentinel.php corrected):<br>Code: if(!ereg("^([0-9]{1,3})\\.([0-9]{1,3})\\.([0-9]{1,3})\\.([0-9]{1,3})$",
<br>$nsnst_const['remote_ip'])) { $nsnst_const['remote_ip'] = "none"; }<br><br>There is always the SQL Injection in includes/nsbypass.php.<br>