Date: Wed, 18 Jan 2012 14:55:04 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Ronald van den Blink <oss-security@...urityview.nl> Subject: Re: CVE request - Batavi 1.2.1 Fixes Blind SQL Injection vulnerability in boxToReload parameter of ajax.php On 01/18/2012 06:31 AM, Ronald van den Blink wrote: > Hi, > > Can we please have a CVE assigned for the following fix in Batavi 1.2.1 (http://sourceforge.net/projects/batavi/files/). > > As pointed out by Canberk BOLAT of Mavituna Security, version before 1.2.1 have a Blind SQL Injection Vulnerability in the boxToReload parameter of ajax.php. This has been fixed in Batavi 1.2.1. > > Relevant part of the changelog: > > For details about the changes of the downloaded version you'll find a changes.txt in the root folder of the package. > > Version 1.2.1 > > [..] > > Security: > > - Fixed SQL injection in modules; > - Improvements methods of Database to handle it; > - All data which come from user going via special check to strip all dangerous values. > > [..] > > With kind regards, > > Ronald van den Blink > Project Manager > Iceshop BV > > Iceshop BV is the main contributor to the next generation open source e-commerce software Batavi. Batavi is the first open source e-commerce software that can easy handle more than 100.000 products and has native Icecat (www.icecat.biz) integration. Can you include a link to the code commit(s) that fiix this? Thanks. -- -- Kurt Seifried / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.