lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <004001c45c33$6fc426f0$2900a8c0@portatile> From: admin at securitywireless.info (D'Amato Luigi) Subject: ZH2004-14SA (security advisory):Sql Injection in Infinity WEB 06/27/2004 Vendor contacted: June 1st 2004 Published: June 26th 2004 Title: Infinity WEB Vulnerable versions :1.0 unpatched Type: Sql Injection Author: D'Amato Luigi from Zone-h Security Labs - securitywireless@...e-h.it - admin@...uritywireless.info Vendor: http://www.websoft.it/ Description ********** Zone-H Security Team has discovered a security flaw in Infinity WEB . This vulnerability could allow malicious attackers to bypass the authentication mechanish without having an account. Details ******************************************** Due to an improper login validation in the login page it is possible to bypass the authentication mechanism Solution ********** The vendor has been contacted and has released a patch --- D'Amato Luigi from Zone-h Security Labs - securitywireless@...e-h.it - admin@...uritywireless.info Admin Security Wireless http://www.securitywireless.info http://www.zone-h.org/en/advisories/read/id=4892/ -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040627/344524a7/attachment.html