lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue Jun 20 09:41:27 2006 From: bpons at oasyssoft.com (Blanca Pons de Dalmases) Subject: Solved -flaws in e-business designer (eBD) Dear all, The second vulnerability - (2) Sql injection and path disclosure - says that a user who is authenticated as a manager, can use SQL injection to modify the data of the data base. This could be consider as a bug, but not as a vulnerability, since ALL the "manager users" have a tool in eBD called SQLManager, that allows them to send querys against the data base with no need to use SQL Injection. The "manager users" in eBD are "application developers", and they can create tables, modify the data, etc., they do not need to use SQL injection to obtain this, so we can not consider this as a security vulnerability. If you require further information, please contact us at ebd.soporte@...yssoft.com. In spanish: "La segunda vulnerabilidad dice que un usuario que esta autenticado como administrador, puede usar sql injection para modificar los datos de la base de datos. Esto podria considerarse un bug, pero no una vulnerabilidad, ya que TODOS los usuarios administradores tienen una herramienta en eBD llamada SQLManager, que les permite lanzar querys contra la base de datos sin necesidad de usar SQL Injection. Los usuarios administradores en eBD son desarrolladores de aplicaciones, y pueden crear tablas, modificar los datos, etc..., no necesitan usar sql injection para conseguir esto, con lo que no se puede considerar una vulnerabilidad de seguridad." Blanca Pons bpons@...yssoft.com Dir. Marketing y Comunicaci?ne-business designerC/ Sardenya 56 Local 08005 Barcelona Tel: 902 181 349 Fax: 932 217 303 www.oasyssoft.com2655 Le Jeune Rd. Suite 517 Coral Gables, FL 33134 United States Phone: +1(305) 448 2148 Fax: +1(305) 448 0097 www.ebdsoft.com eBD es un producto OasyssoftEste mensaje (as? como los archivos adjuntos o los links que contiene) puede contener informaci?n privilegiada o confidencial. Si no es usted el destinatario indicado, queda notificado de que la utilizaci?n, divulgaci?n y/o copia sin autorizaci?n est? prohibida en virtud de la legislaci?n vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma v?a y proceda a su destrucci?n. This email (and any attachments or hyperlinks within it) may contain information that is confidential, legally privileged or otherwise protected from disclosure. If you are not the intended recipient of this email, you are not entitled to use, disclose, distribute, copy, print, disseminate or rely on this email in any way. If you have received this email in error, please notify the sender immediately by telephone or email and destroy it, and all copies of it. ----- Original Message ----- From: Joxean Koret To: Blanca Pons de Dalmases ; full-disclosure@...ts.grok.org.uk Sent: Friday, June 16, 2006 7:33 PM Subject: Re: [Full-disclosure] Solved -Several flaws in e-business designer (eBD) The advisory talk about 3 vulnerabilities 1) File upload issues (related with your patch). 2) Sql injection and path disclosure. 3) Clear text autentication. I can assume that sysadmin could force https by himself, but... really the 2nd vuln is not related with eBD? On 6/16/06, Blanca Pons de Dalmases <bpons@...yssoft.com> wrote: A Bug in the eBD HTML editor has been discovered. It will allow an user to modify the images of the /imgfiles folder (the files raised in the option resources > images). Oasyssoft, the producer, has installed the patch in all our servers, so all MyeBD users are updated since the end of may. Anyway, you will find here the emergency Patch instalation http://lists.oasyssoft.com/ebd-devel/200605/binNr7awTFdvt.bin for being installed at your servers. Althought this patch is for version 3.1.4, it is also available in all eBD versions. The other mentioned vulnerabilities have no relation to eBD. System Managers are in charge of configuring their servers in a secure way, whether or not they are executing eBD . If you require further information, please contact us at ebd.soporte@...yssoft.com. Blanca Pons bpons@...yssoft.com Dir. Marketing y Comunicaci?ne-business designerC/ Sardenya 56 Local 08005 Barcelona Tel: 902 181 349 Fax: 932 217 303 www.oasyssoft.com2655 Le Jeune Rd. Suite 517 Coral Gables, FL 33134 United States Phone: +1(305) 448 2148 Fax: +1(305) 448 0097 www.ebdsoft.com eBD es un producto Oasyssoft Este mensaje (as? como los archivos adjuntos o los links que contiene) puede contener informaci?n privilegiada o confidencial. Si no es usted el destinatario indicado, queda notificado de que la utilizaci?n, divulgaci?n y/o copia sin autorizaci?n est? prohibida en virtud de la legislaci?n vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma v?a y proceda a su destrucci?n. This email (and any attachments or hyperlinks within it) may contain information that is confidential, legally privileged or otherwise protected from disclosure. If you are not the intended recipient of this email, you are not entitled to use, disclose, distribute, copy, print, disseminate or rely on this email in any way. If you have received this email in error, please notify the sender immediately by telephone or email and destroy it, and all copies of it. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060620/3fc66e35/attachment.html
Powered by blists - more mailing lists