Jump to content

Beehive Forum: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Line 28: Line 28:


==Security and vulnerabilities==
==Security and vulnerabilities==
In May 2007 Beehive Forum was selected as one of the most secure forums from a selection of 10 [[Open Source]] software tested by Dragos Lungu Dot Com.<ref>[http://www.dragoslungu.com/2007/05/30/top-10-open-source-bulletin-boards-12-months-of-vulnerabilities Top 10 Open Source Forums - 12 Months of Vulnerabilities]</ref>
In May 2007 Beehive Forum was selected as one of the most secure forums from a selection of 10 [[open-source software]] tested by Dragos Lungu Dot Com.<ref>[http://www.dragoslungu.com/2007/05/30/top-10-open-source-bulletin-boards-12-months-of-vulnerabilities Top 10 Open Source Forums - 12 Months of Vulnerabilities]</ref>


On 28 November 2007 Nick Bennet and Robert Brown of [[Symantec Corporation]] discovered a security flaw related to Beehive's database input handling. The vulnerability could "allow a remote user to execute SQL injection attacks".<ref>[http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-014.txt Symantec Security Advisory YMSA-2007-014]</ref><ref>[http://www.securityfocus.com/bid/26492 Beehive Forum Post.PHP SQL Injection Vulnerability - SecurityFocus]</ref> The flaw affected all versions of the software up to 0.7.1. The Beehive Forum team responded very rapidly with a fix released, in the form of version 0.8 of the software, later that day.<ref>[http://sourceforge.net/forum/forum.php?forum_id=759274 Project Beehive Forum at Sourceforge.net] {{webarchive|url=https://web.archive.org/web/20090307050501/http://sourceforge.net/forum/forum.php?forum_id=759274 |date=2009-03-07 }}</ref>
On 28 November 2007 Nick Bennet and Robert Brown of [[Symantec Corporation]] discovered a security flaw related to Beehive's database input handling. The vulnerability could "allow a remote user to execute SQL injection attacks".<ref>[http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-014.txt Symantec Security Advisory YMSA-2007-014]</ref><ref>[http://www.securityfocus.com/bid/26492 Beehive Forum Post.PHP SQL Injection Vulnerability - SecurityFocus]</ref> The flaw affected all versions of the software up to 0.7.1. The Beehive Forum team responded very rapidly with a fix released, in the form of version 0.8 of the software, later that day.<ref>[http://sourceforge.net/forum/forum.php?forum_id=759274 Project Beehive Forum at Sourceforge.net] {{webarchive|url=https://web.archive.org/web/20090307050501/http://sourceforge.net/forum/forum.php?forum_id=759274 |date=2009-03-07 }}</ref>

Revision as of 04:50, 4 December 2018

Beehive Forum
Stable release
1.5.2 / November 5, 2016 (2016-11-05)
RepositoryBeehiveForum on GitHub
Operating systemPlatform Independent
PlatformPHP/MySQL
TypeInternet forum software
LicenseGPL
Websitewww.beehiveforum.co.uk

Beehive Forum is a free and open-source forum system using the PHP scripting language and MySQL database software.

The main difference between Beehive and most other forum software is its frame-based interface, which lists discussion titles on the left and displays their contents on the right.

Features

Other features which differentiate Beehive from most forums include:

  • Targeted replies to specific users and/or posts.
  • Safe HTML posting (malicious code is stripped out), rather than BBCode, via WYSIWYG editor, helper toolbar, or manual typing.
  • A relationship system, allowing users to ignore users and/or signatures that they dislike.
  • Powerful forum-wide and per-user word filtering, including a regular expression option.
  • A flexible polling system, allowing public or private ballot, grouped answers, and different result modes.
  • A built-in "light mode" that allows basic forum access from PDAs and web-enabled mobilephones.

Beehive is used by the popular UK technology website The Inquirer on the Hermits Cave Message Board.[1][2]

Security and vulnerabilities

In May 2007 Beehive Forum was selected as one of the most secure forums from a selection of 10 open-source software tested by Dragos Lungu Dot Com.[3]

On 28 November 2007 Nick Bennet and Robert Brown of Symantec Corporation discovered a security flaw related to Beehive's database input handling. The vulnerability could "allow a remote user to execute SQL injection attacks".[4][5] The flaw affected all versions of the software up to 0.7.1. The Beehive Forum team responded very rapidly with a fix released, in the form of version 0.8 of the software, later that day.[6]

Reviews

See also

References