|
Message-ID: <20120522094359.GC31404@kludge.henri.nerv.fi> Date: Tue, 22 May 2012 12:43:59 +0300 From: Henri Salo <henri@...v.fi> To: oss-security@...ts.openwall.com Subject: Re: CVE request: Serendipity before 1.6.2 SQL Injection On Tue, May 22, 2012 at 11:05:02AM +0200, Hanno Böck wrote: > Upstream: > http://blog.s9y.org/archives/241-Serendipity-1.6.2-released.html > Advisory: > https://www.htbridge.com/advisory/HTB23092 > > Upstream description of the issue: > "The error here is that input is not properly validated and can be used > (when magic_quotes_gpc is off) to inject SQL code to a SQL query; since > our DB layer does not execute multiple statements, and the involved SQL > query is not used to produce output code, we regard the impact as low. > Nevertheless, please upgrade your installation." > > Please assign CVE. > > -- > Hanno Böck mail/jabber: hanno@...eck.de > GPG: BBB51E42 http://www.hboeck.de/ Is this same as: http://seclists.org/oss-sec/2012/q2/352 It looks to me as a same issue. - Henri Salo
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.