|
Message-ID: <1364128867.154141286824300900.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com> Date: Mon, 11 Oct 2010 15:11:40 -0400 (EDT) From: Josh Bressers <bressers@...hat.com> To: oss-security@...ts.openwall.com Cc: coley <coley@...re.org> Subject: Re: CVE request eoCMS SQL injection vulnerability This needs a 2009 ID. Steve, can MITRE take it. Thanks. -- JB ----- "Henri Salo" <henri@...v.fi> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Description: "Cao Xuan Sang has reported a vulnerability in eoCMS, > which > can be exploited by malicious people to conduct SQL injection > attacks. > > Certain input passed to the page divide function of the viewboard and > viewtopic modules is not properly sanitised before being used in SQL > queries. This can be exploited to manipulate SQL queries by injecting > arbitrary SQL code." > > References: > http://secunia.com/advisories/37272/ > http://security.bkis.com/eocms-sql-injection-vulnerability/ > > Fixed in version: 0.9.02 > > Can I get CVE-identifier for this issue? > > Best regards, > Henri Salo > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.9 (GNU/Linux) > > iEYEARECAAYFAkyvcPsACgkQXf6hBi6kbk+2rwCcCZamyTdNH/KYU1hUIB6kgHV2 > Lx8AnRny2eowTyJBUz+tEM0I3OdP34RF > =+rgg > -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.