Multiple Vulnerabilities: LedgerSMB < 1.2.15

2008.09.16
Credit: Chris Travers
Risk: High
Local: No
Remote: Yes

Multiple vulnerabilities: LedgerSMB Synopsis: Two vulnerabilities announced in LedgerSMB for versions prior to 1.2.15 Status: Corrected in version 1.2.15 and later (vendor fix available). Impact: Resource exhaustion on server, arbitrary SQL command execution. Other software affected: SQL-Ledger, all versions, and likely related software Two vulnerabilities have been recently discovered in LedgerSMB which have been patched in version 1.2.15 and later. Vulnerability 1: Resource exhaustion Problem: The CGI scripts read the query string up to $ENV{CONTENT_LENGTH}, allowing for unlimited data in POST operations to any screen. Authentication is not required and this can be used to deny service not only to LedgerSMB but potentially to anything else running on the server. This was corrected in 1.2.15. Credit for discovery: Chris Murtagh Vulnerability 2: SQL Injection in AR/AP Transactions Report A parameter was not properly validated prior to being included in the SQL for generating this report. It would have been possible to inject arbitrary SQL into the query. Authentication is required to exploit. This was corrected in 1.2.15. Credit for discovery: Seneca Cunningham

References:

http://www.securityfocus.com/bid/31109
http://xforce.iss.net/xforce/xfdb/45033
http://www.securityfocus.com/archive/1/archive/1/496181/100/0/threaded
http://www.ledgersmb.org/node/70
http://secunia.com/advisories/31843


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top