<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom"><title type="text">Blog posts by Jens N</title><link href="http://world.optimizely.com" /><updated>2012-01-10T12:24:00.0000000Z</updated><id>https://world.optimizely.com/blogs/Jens-N/</id> <generator uri="http://world.optimizely.com" version="2.0">Optimizely World</generator> <entry><title>Security vulnerability - Elevation of privilege</title><link href="https://world.optimizely.com/blogs/Jens-N/Dates/2012/1/Security-vulnerability---Elevation-of-privilege/" /><id>&lt;p&gt;A security vulnerability has been detected which allows elevation of privilege for a user that has access to Edit mode in EPiServer CMS 5 and CMS 6. In practice this means that someone with editorial privileges could take ownership of the “WebAdmins” account.&lt;/p&gt;
&lt;p&gt;Websites based on EPiServer CMS 5 and 6 using Forms Authentication with a Membership provider that supports updating are affected by this security vulnerability. Websites using Windows Authentication or Forms Authentication with Windows Membership provider are not affected.&lt;/p&gt;
&lt;p&gt;We recommend our partners to contact &lt;a href=&quot;http://world.episerver.com/Support/Register-Support-Incident/&quot;&gt;EPiServer Developer Support&lt;/a&gt; to obtain a hotfix for the CMS specific security concerns.&lt;/p&gt;
&lt;p&gt;The above shares some characteristics with the vulnerability previously reported by Microsoft, &lt;strong&gt;but should not be mistaken as the same&lt;/strong&gt;. For more information see &lt;a href=&quot;http://technet.microsoft.com/en-us/security/bulletin/ms11-100.mspx&quot;&gt;Microsoft Security Bulletin MS11-100&lt;/a&gt;&lt;/p&gt;</id><updated>2012-01-10T12:24:00.0000000Z</updated><summary type="html">Blog post</summary></entry> <entry><title>Important information to those running EPiServer CMS 4</title><link href="https://world.optimizely.com/blogs/Jens-N/Dates/2010/12/Important-information-to-those-running-EPiServer-CMS-4/" /><id>&lt;p&gt;It has come to our attention that the e-mail functionality delivered with the sample package for CMS 4 is in fact used in some public web applications. If this sample functionality is used without intended modification, it is possible for spambots to actively utilize the functionality and send unsolicited messages or bulk e-mail spam through the SMTP service.    &lt;br /&gt;    &lt;br /&gt;We strongly advise all concerned parties to undertake necessary actions&amp;#160; to ensure that the situation is remedied.&amp;#160; We recommend that the e-mail template file and all subsequent references are removed from the web application. If the e-mail sample functionality is to be used we strongly recommend that proper relay restrictions are setup and that appropriate logic to prevent spambots from exploiting this functionality is implemented.    &lt;br /&gt;&lt;/p&gt;  &lt;p&gt;If you have any questions or concerns, you are welcome to contact &lt;a href=&quot;http://world.episerver.com/Support/Register-Support-Incident/&quot;&gt;EPiServer Developer Support&lt;/a&gt;.    &lt;/p&gt;</id><updated>2010-12-02T10:34:41.0000000Z</updated><summary type="html">Blog post</summary></entry></feed>