Date: Tue, 5 Jul 2005 18:58:47 +0200
From: Hans Wolters <hans.wolters@xs4all.nl.>
To: [email protected]Subject: [covide] possible sql injection
Message-ID: <20050705185847.26967f6d@lappie.lonki.xs4all.nl.>
Organization: Spamikaze
X-Mailer: Sylpheed-Claws 1.0.4 (GTK+ 1.2.10; i686-pc-linux-gnu)
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: antivirus-gw at tyumen.ru
Summary:
Covide, a webbased groupware application has had a problem where it was possible to inject
sql due to special crafted urls. This made it possible to change the user id once logged in.
Solution provided to the authors:
Type cast the queries where possible and check user input to see if it is what
is expected.
Contacted the authors on June the 5th 2005. Havn't had a reply yet, although the cvs shows
that they are working on a fix. A session user id is now being used instead of
a user id which was fetched global.
More info:
http://sourceforge.net/projects/covide/
Regards,
Hans Wolters
--
http://blacklist.kernelnewbies.nl/