<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: MoBiC-23 Bonus: XSS in Math Comment Spam Protection</title>
	<link>http://websecurity.com.ua/1576/</link>
	<description></description>
	<pubDate>Thu, 23 Apr 2026 03:51:22 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1576/#comment-86013</link>
		<pubDate>Sun, 02 Dec 2007 21:45:53 +0000</pubDate>
		<guid>http://websecurity.com.ua/1576/#comment-86013</guid>
					<description>&lt;strong&gt;Michael&lt;/strong&gt;

I didn't inform you about holes in your plugin yet because of a few reasons. 1st - because of lack of time (I'm very busy man and I was overloaded with my MoBiC project). And 2nd - because in &lt;a href="/category/mobic/" rel="nofollow"&gt;Month of Bugs in Captchas&lt;/a&gt; project I decided not to inform all captchas developers in November, but to inform them in December (on the other hand I announced my project in October). It's because of time which need to inform every captchas developers (in whose captchas I found holes) and also because of the idea of project, that developers must themselves watch to security of their captchas. Which is very easy with my project where I posted holes in captchas only, so no need to watch many sources, just watch my MoBiC project to find if your captcha is vulnerable, and if it is to fix it.

But in any case I was trying to inform beforehand users of those captchas which will be in my project. In case of your plugin I informed admin of &lt;a href="/1575/" rel="nofollow"&gt;blog at tehposse.org&lt;/a&gt; (which use Math Comment Spam Protection).

And it is good, that you found this article (which was made for you and for every user of plugin) and already fixed the XSS holes. When I'll find time I maybe look at new version of your plugin (to check how it was fixed).

But, Michael, as I see from you comment and from post at your site, you fixed only XSS holes. But it's only bonus post about XSS holes in Math Comment Spam Protection. The main post is about &lt;a href="/1575/" rel="nofollow"&gt;Insufficient Anti-automation hole&lt;/a&gt; in your plugin - it's about bypassing captcha, which is main topic of MoBiC project. Did you read that article? I see you didn't. I recommend you to read it too and to fix the hole.</description>
		<content:encoded><![CDATA[<p><strong>Michael</strong></p>
<p>I didn&#8217;t inform you about holes in your plugin yet because of a few reasons. 1st - because of lack of time (I&#8217;m very busy man and I was overloaded with my MoBiC project). And 2nd - because in <a href="/category/mobic/" rel="nofollow">Month of Bugs in Captchas</a> project I decided not to inform all captchas developers in November, but to inform them in December (on the other hand I announced my project in October). It&#8217;s because of time which need to inform every captchas developers (in whose captchas I found holes) and also because of the idea of project, that developers must themselves watch to security of their captchas. Which is very easy with my project where I posted holes in captchas only, so no need to watch many sources, just watch my MoBiC project to find if your captcha is vulnerable, and if it is to fix it.</p>
<p>But in any case I was trying to inform beforehand users of those captchas which will be in my project. In case of your plugin I informed admin of <a href="/1575/" rel="nofollow">blog at tehposse.org</a> (which use Math Comment Spam Protection).</p>
<p>And it is good, that you found this article (which was made for you and for every user of plugin) and already fixed the XSS holes. When I&#8217;ll find time I maybe look at new version of your plugin (to check how it was fixed).</p>
<p>But, Michael, as I see from you comment and from post at your site, you fixed only XSS holes. But it&#8217;s only bonus post about XSS holes in Math Comment Spam Protection. The main post is about <a href="/1575/" rel="nofollow">Insufficient Anti-automation hole</a> in your plugin - it&#8217;s about bypassing captcha, which is main topic of MoBiC project. Did you read that article? I see you didn&#8217;t. I recommend you to read it too and to fix the hole.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Michael</title>
		<link>http://websecurity.com.ua/1576/#comment-85899</link>
		<pubDate>Tue, 27 Nov 2007 23:15:09 +0000</pubDate>
		<guid>http://websecurity.com.ua/1576/#comment-85899</guid>
					<description>Why don't you inform the plugin's authors about your findings? Fortunately, a blogger has informed me about your article.

A fixed plugin version is available in the meantime, version 2.2. Not yet available at wordpress.org though since it takes a while until their website script updates the latest uploads, however available at the plugin's website.</description>
		<content:encoded><![CDATA[<p>Why don&#8217;t you inform the plugin&#8217;s authors about your findings? Fortunately, a blogger has informed me about your article.</p>
<p>A fixed plugin version is available in the meantime, version 2.2. Not yet available at wordpress.org though since it takes a while until their website script updates the latest uploads, however available at the plugin&#8217;s website.
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
