Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4FA98495.4010503@redhat.com>
Date: Tue, 08 May 2012 14:39:49 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henri Salo <henri@...v.fi>
Subject: Re: CVE-request: MyBB before 1.6.1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05/08/2012 02:37 AM, Henri Salo wrote:
> Can I get 2010 CVE-identifiers for these two vulnerabilities,
> thanks.
> 
> 1. MyBB search.php keywords Parameter SQL Injection
> 
> MyBB contains a flaw that may allow an attacker to carry out an SQL
> injection attack. The issue is due to the search.php script not
> properly sanitizing user-supplied input to the keywords parameter.
> This may allow an attacker to inject or manipulate SQL queries in
> the back-end database, allowing for the manipulation or disclosure
> of arbitrary data."""
> 
> Reference: http://osvdb.org/show/osvdb/70013 Advisory:
> http://yehg.net/lab/pr0js/advisories/%5Bmybb1.6%5D_sql_injection
> 
> 2. MyBB private.php keywords Parameter SQL Injection
> 
> MyBB contains a flaw that may allow an attacker to carry out an SQL
> injection attack. The issue is due to the private.php script not
> properly sanitizing user-supplied input to the keywords parameter.
> This may allow an attacker to inject or manipulate SQL queries in
> the back-end database, allowing for the manipulation or disclosure
> of arbitrary data.

Merged, same reporter, same issue type, same version #. Please use
CVE-2010-5096 for these issues.

> - Henri Salo


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBAgAGBQJPqYSVAAoJEBYNRVNeJnmTWgQP/2L9BbpAJ5tZLnD7NGNtFEee
wcfjZBbY7DhNBEVaXFwBd1HR5FM0ZBQen2NbxzhIYY2meYr4FWvxwAaLwUHy1Zmg
Lgl5vfXIKsi6tZdjwtRho+FdqN9a9Utx5vgk2VA4uVSyc8nL40ixjLJspc9tPtPV
ue8jXd4RHhY4MQeApzjSCDY+irrgddeAyQAncjE2nSKAIftWZurq9lZP4UQaXgUT
xTuxtHVkbK92zZgwPWDJE2U6el9hBNEoolGW6VcGsWdgiHgoyiI6Nlx+zJPIq4Nf
nLQHX1dhG+mcxT/RxbqxQtqywccv3FiuejxD+3JJPNcTy7jXrl/y3xQGYMtr53EW
FEVbOVR6gXh365DbDNTEgX+HJbOOo/6Mgr9rgrtBhI4LcXx+x6tXO3BCkTjtjgXG
Uc5VpBx+Uckxayx67YzXWSj/2cVrKqJGzhY0ZloHOYFLBF1DZMh0o9W6fkZFQYK9
8wa+p/Lt4kHCiPQBSLiIS2H5na8juMjVDqE5pQBeu5+kzc9Nco2sHqgFfYBwXWI0
J8c5pwlDEuwcLT+JcmkQPf/dtgwbhwcxYRyZ1t4AQ8Z+J/D8nDRYqCtiMisNYw/G
1HGpTB/vXzJYt08EiPlSX5wwRIv+2C9KKwZheir6iKZk7MAKcx6OWhDxMjMg2Zzs
mjRe+jvIUYvHWL2HO5wk
=+1R+
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.