lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3diEPyg3Jgx-GnoqFHnLee1kyEVyt7KD5MgMlgw4n7SFoHu2-bx7iSvi4pVhE4GiTnQOybsAOBj3ao4uOyBPnJMfAx4GdveQ4BaL63Lmoko=@protonmail.com>
Date: Thu, 17 Dec 2020 11:49:57 +0000
From: Georg Ph E Heise via Fulldisclosure <fulldisclosure@...lists.org>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] Programi Bilanc - Build 007 Release 014 31.01.2020 - Multiple
	SQL Injections [CVE-2020-11717]

Programi Bilanc - Build 007 Release 014 31.01.2020 - Multiple SQL Injections

=============================================================================

Identifiers

-------------------------------------------------

CVE-2020-11717

Vendor

-------------------------------------------------

Balanc Shpk (https://bilanc.com)

Product

-------------------------------------------------

Programi Bilanc

Affected versions

-------------------------------------------------

Programi Bilanc - Build 007 Release 014 31.01.2020 and probably below

Credit

-------------------------------------------------

Georg Ph E Heise (@gpheheise) / Lufthansa Industry Solutions (@LHIND_DLH)

Christian Pappas / Lufthansa Industry Solutions (@LHIND_DLH)

Vulnerability summary

-------------------------------------------------

Programi Bilanc - Build 007 Release 014 31.01.2020 and below suffers from multiple SQL Injection vulnerabilities due to unprepared statements .

Technical details

------------------------------------------------

When searching for products or services entering modified content an attacker can trigger Reflected Cross-Site

scriptings

Proof of concept

-------------------------------------------------

Witheld

Solution

-------------------------------------------------

Don’t use the software in its current version & contact vendor for a solution

Timeline

-------------------------------------------------

Date| Status

------------|--------------------

01–APR-2020 | Reported to vendor

30-JUN-2020 | End of 90 days Full Disclosure Time

17-DEZ-2020 | FULL disclosure

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ