lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040211075044.17637.qmail@www.securityfocus.com> Date: 11 Feb 2004 07:50:44 -0000 From: ZetaLabs <zetalabs@...e-h.org> To: bugtraq@...urityfocus.com Subject: ZH2004-05SA (security advisory): Sql Injection Vulnerability in BosDates ZH2004-05SA (security advisory): Sql Injection Vulnerability in BosDates Published: 11 february 2004 Released: 11 february 2004 Name: BosDates Affected Systems: current and prior versions Issue: Sql Injection Vulnerability Author: G00db0y from Zone-h Security Labs - zetalabs@...e-h.org Vendor: http://www.bosdev.com Description *********** Zone-h Security Team has discovered a flaw in BosDates. There is a vulnerability in the current version (and also in prior versions) of BosDates that allows an attacker to disclose sensitive information that could be used to gain unauthorized access. "BosDates is hands-down the MOST feature packed calendar on the market today. The BosDates calendar system is the best full featured calendar system on the market today at half the price of our competitors!" Details ******* The problems exist due to insufficient sanitization of user-supplied data. A remote attacker may exploit this issue to influence SQL query logic to disclose sensitive information that could be used to gain unauthorized access. For example try this: http://www.site.com/directory/calendar_download.php?calendar=[query] Solution: ********* The vendor has been contacted and a patch was produced. Original advisory: ****************** http://www.zone-h.org/en/advisories/read/id=3925/ G00db0y from Zone-h Security Labs - zetalabs@...e-h.org