[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request eoCMS SQL injection vulnerability
From:       Josh Bressers <bressers () redhat ! com>
Date:       2010-10-11 19:11:40
Message-ID: 1364128867.154141286824300900.JavaMail.root () zmail01 ! collab ! prod ! int ! phx2 ! redhat ! com
[Download RAW message or body]

This needs a 2009 ID.

Steve, can MITRE take it.

Thanks.

-- 
    JB


----- "Henri Salo" <henri@nerv.fi> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Description: "Cao Xuan Sang has reported a vulnerability in eoCMS,
> which
> can be exploited by malicious people to conduct SQL injection
> attacks.
> 
> Certain input passed to the page divide function of the viewboard and
> viewtopic modules is not properly sanitised before being used in SQL
> queries. This can be exploited to manipulate SQL queries by injecting
> arbitrary SQL code."
> 
> References:
> http://secunia.com/advisories/37272/
> http://security.bkis.com/eocms-sql-injection-vulnerability/
> 
> Fixed in version: 0.9.02
> 
> Can I get CVE-identifier for this issue?
> 
> Best regards,
> Henri Salo
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (GNU/Linux)
> 
> iEYEARECAAYFAkyvcPsACgkQXf6hBi6kbk+2rwCcCZamyTdNH/KYU1hUIB6kgHV2
> Lx8AnRny2eowTyJBUz+tEM0I3OdP34RF
> =+rgg
> -----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic