lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1133473837.438f702dd99a9@webmail.kyxar.fr> Date: Thu, 1 Dec 2005 22:50:37 +0100 From: David Maciejak <david.maciejak@...ar.fr> To: bugtraq@...urityfocus.com Subject: Edgewall Trac SQL Injection Vulnerability Edgewall Trac SQL Injection Vulnerability Trac is an enhanced wiki and issue tracking system for software development project. It provides an interface to Subversion. More information on http://projects.edgewall.com/trac/ Description: Malicious user can conduct SQL injection in ticket query module because supplied 'group' URI data passed to the query script is not properly sanitized. PoC: http://host/trac/query?group=/* Vulnerable version: Version tested is 0.9 Maybe 0.9 betas are also vulnerable Solution: Upgrade to version 0.9.1 http://projects.edgewall.com/trac/wiki/TracDownload Thanks for the quick fix of the Trac Team ! David Maciejak -------------------------------------------------------------------------------- KYXAR.FR - Mail envoyé depuis http://webmail.kyxar.fr