Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 145519 - www-apps/xoops SQL injection
Summary: www-apps/xoops SQL injection
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High trivial (vote)
Assignee: Gentoo Security
URL: http://www.securityfocus.com/archive/...
Whiteboard: ~3 [ebuild?]
Keywords:
Depends on:
Blocks:
 
Reported: 2006-08-29 12:32 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2006-09-02 06:59 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-08-29 12:32:14 UTC
There is a sql injection in Xoops 2.0.14 (and maybe before versions) .
 One of the user inputs, is used in the sql query without proper checking :
 
 File /edituser.php, Line 347 :
 :: if (!empty($_POST['user_avatar'])) {
 >> $user_avatar = trim($_POST['user_avatar']);
 :: $criteria_avatar = new CriteriaCompo(new Criteria('avatar_file', $user_avatar));
 :: $criteria_avatar->add(new Criteria('avatar_type', "S"));
 :: $avatars =& $avt_handler->getObjects($criteria_avatar);
 :: if (!is_array($avatars) || !count($avatars)) {
 :: $user_avatar = 'blank.gif';
 :: }
 
 The bug can be critical, so no more info .
 
 You can upgrade to 2.0.15 .
 Also, a simple solution is to change line 348 of /edituser.php, to :
 $user_avatar = addslashes(trim($_POST['user_avatar']));
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2006-09-02 01:53:57 UTC
This is fixed in 2.0.15 (latest version on upstream site) but portage has 2.2.4 ??
Comment 2 Renat Lumpau (RETIRED) gentoo-dev 2006-09-02 05:03:10 UTC
I believe 2.2.x is their dev branch. We currently don't have any ebuilds for the 2.0.x branch.
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-02 06:59:23 UTC
Closing this one as INVALID then.