Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1364128867.154141286824300900.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com>
Date: Mon, 11 Oct 2010 15:11:40 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: CVE request eoCMS SQL injection vulnerability

This needs a 2009 ID.

Steve, can MITRE take it.

Thanks.

-- 
    JB


----- "Henri Salo" <henri@...v.fi> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Description: "Cao Xuan Sang has reported a vulnerability in eoCMS,
> which
> can be exploited by malicious people to conduct SQL injection
> attacks.
> 
> Certain input passed to the page divide function of the viewboard and
> viewtopic modules is not properly sanitised before being used in SQL
> queries. This can be exploited to manipulate SQL queries by injecting
> arbitrary SQL code."
> 
> References:
> http://secunia.com/advisories/37272/
> http://security.bkis.com/eocms-sql-injection-vulnerability/
> 
> Fixed in version: 0.9.02
> 
> Can I get CVE-identifier for this issue?
> 
> Best regards,
> Henri Salo
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (GNU/Linux)
> 
> iEYEARECAAYFAkyvcPsACgkQXf6hBi6kbk+2rwCcCZamyTdNH/KYU1hUIB6kgHV2
> Lx8AnRny2eowTyJBUz+tEM0I3OdP34RF
> =+rgg
> -----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.