[VIM] [Fwd: Geeklog search.php Failed SQL Query Path Disclosure]

Sullo sullo at cirt.net
Sat Feb 18 12:22:48 EST 2006

CVE-2005-4026 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-4026>

-------- Original Message --------


on <http://www.osvdb.org/21398>, you have the following statement:

--- snip ---
Geeklog contains a flaw that may allow an attacker to carry out an SQL
injection attack. The issue is due to the search.php script not properly
sanitizing user-supplied input to the datestart and dateend variables.
This may allow an attacker to inject or manipulate SQL queries in the
backend database.
Currently, there are no known upgrades, patches, or workarounds
available to correct this issue.
--- snip ---

This information is not correct. It was NOT possible to perform an SQL
injection. Malformed "date" fields only caused a PHP warning message to
be displayed that would disclose the path in which Geeklog is installed
on the server.

This issue was resolved with the release of Geeklog 1.3.11sr3 on
2005-12-12 and 1.4.0rc1 on 2005-12-31.

Also see <http://www.geeklog.net/article.php/geeklog-1.3.11sr3>

Please update your advisory accordingly. Thank you.

Dirk Haun (for the Geeklog Team)



http://www.cirt.net/      |     http://www.osvdb.org/

More information about the VIM mailing list