| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <004d01c2433d$b605e1a0$e62d1c41@kc.rr.com>
From: mattmurphy at kc.rr.com (Matthew Murphy)
Subject: L-Forum Vulnerability - SQL Injection
I have discovered an SQL injection flaw in L-Forum which has
a recent record (upload spoofing/XSS by Ulf) of security bugs.
The problem this time is search.php. It doesn't properly escape
the SQL data passed in by the user in the search member. I
have provided a SourceForge patch for this vulnerability. I
have shown URLs that exploit this:
Postgres:
http://localhost/search.php?search=a%27%20order%20by%20time%20desc%3b%20[que
ry]
MySQL:
http://localhost/search.php?search=a%25%27%20order%20by%20time%20desc%3b%20[
query]
I've patched this on SourceForge:
http://sourceforge.net/tracker/download.php?group_id=53716&atid=471341&file_
id=29026&aid=594867
"The reason the mainstream is thought
of as a stream is because it is
so shallow."
- Author Unknown