lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 30 May 2009 13:56:06 +0100
From: Nico Leidecker <>
Subject: OCS Inventory NG 1.02 - Multiple SQL Injections

OCS Inventory NG - Multiple SQL Injections (May 30 2009)

* Product

  Open Computer and Software (OCS) Inventory NG

* Vulnerable Versions

  OCS Inventory NG 1.02 (Unix)

* Vendor Status

  Vendor has been notified and the vulnerability has been fixed.

* Details

  The Open Computer and Software (OCS) Inventory Next Generation (NG)
provides relevant inventory information about system configurations and
software on the network. The server can be managed using a web
interface. It was found that the application does not properly sanitize
user input which results into multiple SQL injections.

  Affected are the following scripts:

  - download.php (parameters `N', `DL', `O' and `V')
  - group_show.php (parameter `SYSTEMID');

* Impact

  Attackers may be able to manipulate SQL statements in such a way that
they can retrieve, create or modify information stored in the database.
Furthermore, the SQL injection might allow attackers to get a foothold
on the underlying system.

* Exploit

  The vulnerability can be exploited by just using a web browser:'union+all+select+concat(id,':',passwd)+from+operators%23

Nico Leidecker -

Powered by blists - more mailing lists