[39418] in bugtraq

home help back first fref pref prev next nref lref last post

[covide] possible sql injection

daemon@ATHENA.MIT.EDU (Hans Wolters)
Tue Jul 5 17:50:03 2005

Date: Tue, 5 Jul 2005 18:58:47 +0200
From: Hans Wolters <hans.wolters@xs4all.nl>
To: bugtraq@securityfocus.com
Message-ID: <20050705185847.26967f6d@lappie.lonki.xs4all.nl>
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit


Summary:

Covide, a webbased groupware application has had a problem where it was possible to inject
sql due to special crafted urls. This made it possible to change the user id once logged in.

Solution provided to the authors:

Type cast the queries where possible and check user input to see if it is what 
is expected.

Contacted the authors on June the 5th 2005. Havn't had a reply yet, although the cvs shows
that they are working on a fix. A session user id is now being used instead of 
a user id which was fetched global.

More info:

http://sourceforge.net/projects/covide/

Regards,

Hans Wolters

-- 
    http://blacklist.kernelnewbies.nl/

home help back first fref pref prev next nref lref last post