The adclick.php script is vulnerable to HTTP response splitting attacks
because the "dest" parameter is not properly sanitized.
The vulnerability DOES NOT affect those running PHP >= 4.4.2 or PHP >=
5.1.2, because the header function blocks this kind of attacks.
The security contact for Openads can be reached at:
<security AT openads DOT org>
Matteo Beccati
http://www.openads.org
http://phpadsnew.com
http://phppgads.com
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/