|
Message-ID: <20101008222859.02ebbd43@foo.fgeek.fi> Date: Fri, 8 Oct 2010 22:28:59 +0300 From: Henri Salo <henri@...v.fi> To: oss-security@...ts.openwall.com Subject: CVE request eoCMS SQL injection vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Description: "Cao Xuan Sang has reported a vulnerability in eoCMS, which can be exploited by malicious people to conduct SQL injection attacks. Certain input passed to the page divide function of the viewboard and viewtopic modules is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code." References: http://secunia.com/advisories/37272/ http://security.bkis.com/eocms-sql-injection-vulnerability/ Fixed in version: 0.9.02 Can I get CVE-identifier for this issue? Best regards, Henri Salo -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkyvcPsACgkQXf6hBi6kbk+2rwCcCZamyTdNH/KYU1hUIB6kgHV2 Lx8AnRny2eowTyJBUz+tEM0I3OdP34RF =+rgg -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.