Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 8 Oct 2010 22:28:59 +0300
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Subject: CVE request eoCMS SQL injection vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Description: "Cao Xuan Sang has reported a vulnerability in eoCMS, which
can be exploited by malicious people to conduct SQL injection attacks.

Certain input passed to the page divide function of the viewboard and
viewtopic modules is not properly sanitised before being used in SQL
queries. This can be exploited to manipulate SQL queries by injecting
arbitrary SQL code."

References:
http://secunia.com/advisories/37272/
http://security.bkis.com/eocms-sql-injection-vulnerability/

Fixed in version: 0.9.02

Can I get CVE-identifier for this issue?

Best regards,
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkyvcPsACgkQXf6hBi6kbk+2rwCcCZamyTdNH/KYU1hUIB6kgHV2
Lx8AnRny2eowTyJBUz+tEM0I3OdP34RF
=+rgg
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.