Since we had this little problem with the third party software Xinha WYSIWYG-Editor, opening a potentially security hole and making Serendipity vulnerable, which was stopped with v. 1.5.5, I was wondering how this could be possible.
I understand its a Xinha Problem, but I dont really understand why it is/was? allowed to execute a script path in serendipity not meant to be opened by public at all.
Is this something we got to live with ?
or
Is it possible to avoid it simply by using the basic Serendipity settings only ?
or
Do we need some htaccess voodoo or similiar there ?
Please enlighten me concerning these questions
Regards
Ian