Vulnerability Bulletins |
Inyección SQL en Gforge |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Obtener acceso |
Dificulty | Experto |
Required attacker level | Acceso remoto sin cuenta a un servicio estandar |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | Gforge 4.5 y 4.6 |
Description |
|
Se ha descubierto una vulnerabilidad en Gforge 4.x. La vulnerabilidad reside en un error en la funcion "create" en "common/include/GroupJoinRequest.class". Un atacante remoto podría ejecutar comandos SQL arbitrarios mediante la variable "comments". |
|
Solution |
|
Actualización de software Debian (DSA-1698-1) Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14.orig.tar.gz http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch9.diff.gz http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch10.diff.gz http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch10.dsc http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch9.dsc Arquitectura independiente: http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-web-apache_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-dns-bind9_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-db-postgresql_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-web-apache_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-courier_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-db-postgresql_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-common_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-ftp-proftpd_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-postgresql_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-postfix_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-common_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-postfix_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim4_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-courier_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-lists-mailman_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-ldap_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim4_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-ldap-openldap_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-ldap_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-ldap-openldap_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-postgresql_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-ftp-proftpd_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-lists-mailman_4.5.14-22etch10_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-dns-bind9_4.5.14-22etch9_all.deb http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim_4.5.14-22etch10_all.deb |
|
Standar resources |
|
Property | Value |
CVE | CVE-2008-2381 |
BID | |
Other resources |
|
Debian Security Advisory (DSA-1698-1) http://lists.debian.org/debian-security-announce/2009/msg00005.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2009-01-09 |