lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAFJuDmNt_nLU+WMDkvmJYvoEo048N3W4cz05gkq34RahZ+WWSA@mail.gmail.com>
Date: Sun, 12 Aug 2012 13:32:03 -0400
From: Adam Caudill <adam@...mcaudill.com>
To: bugtraq@...urityfocus.com
Subject: NeoInvoice Blind SQL Injection (CVE-2012-3477)

NeoInvoice is a multi-tenant open source invoicing system, that
currently contains an unauthenticated blind SQL injection condition in
signup_check.php. The input for the value field isn't being properly
sanitized, and is used in string concatenation to create the SQL
query.

See here for the offending code:

https://github.com/tlhunter/neoinvoice/blob/5e7af94641cba17df9141e95108c369cfb6e6dd5/public/signup_check.php#L29

Proof of concept:

signup_check.php?field=username&value='+OR+SLEEP(5)+OR+'

I've alerted the author but haven't heard back.

More Info: http://adamcaudill.com/2012/08/12/neoinvoice-blind-sql-injection-cve-2012-3477/
Project: https://github.com/tlhunter/neoinvoice

--Adam Caudill
http://adamcaudill.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ