The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[covide] possible sql injection


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 5 Jul 2005 18:58:47 +0200
From: Hans Wolters <hans.wolters@xs4all.nl.>
To: [email protected]
Subject: [covide] possible sql injection
Message-ID: <20050705185847.26967f6d@lappie.lonki.xs4all.nl.>
Organization: Spamikaze
X-Mailer: Sylpheed-Claws 1.0.4 (GTK+ 1.2.10; i686-pc-linux-gnu)
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: antivirus-gw at tyumen.ru


Summary:

Covide, a webbased groupware application has had a problem where it was possible to inject
sql due to special crafted urls. This made it possible to change the user id once logged in.

Solution provided to the authors:

Type cast the queries where possible and check user input to see if it is what 
is expected.

Contacted the authors on June the 5th 2005. Havn't had a reply yet, although the cvs shows
that they are working on a fix. A session user id is now being used instead of 
a user id which was fetched global.

More info:

http://sourceforge.net/projects/covide/

Regards,

Hans Wolters

-- 
    http://blacklist.kernelnewbies.nl/


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру