lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 26 Sep 2015 23:16:02 GMT
From: ibemed@...il.com
To: bugtraq@...urityfocus.com
Subject: CVE-2015-7319 - SQL Injection in Appointment Booking Calendar
 1.1.7 WordPress plugin

Vulnerability title: SQL Injection in Appointment Booking Calendar 1.1.7 WordPress plugin
CVE: CVE-2015-7319
Vendor: WordPress DWBooster
Product: Appointment Booking Calendar
Affected version: 1.1.7
Fixed version: 1.1.8
Reported by: Ibéria Medeiros

Vulnerability Details:
=====================
It was discovered that no protection against SQL injection attack was implemented, resulting in an attacker being able to update the username, gaining access with the new user.

The Appointment Booking Calendar 1.1.7 WordPress plugin is vulnerable to a SLI injection (SQLI) vulnerability.
A SQLI vector was identified in cpabc_appointments_admin_int_calendar_list.inc.php

System affected:
===============
Any system that access to a web site developed by WordPress CMS version 4.3.1 or higher and uses the Appointment Booking Calendar plugin v.1.1.7 or early.

Solution:
========
Update to Appointment Booking Calendar 1.1.8 plugin

Disclosure Timeline:
===================
Vendor Notification: September 22, 2015
Vendor fixed vulnerability: September 22, 2015
Public Disclosure: September 26, 2015

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ