| Summary: | www-apps/xoops SQL injection | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Sune Kloppenborg Jeppesen (RETIRED) <jaervosz> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | trivial | CC: | web-apps |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.securityfocus.com/archive/1/444419/30/30/ | ||
| Whiteboard: | ~3 [ebuild?] | ||
| Package list: | Runtime testing required: | --- | |
This is fixed in 2.0.15 (latest version on upstream site) but portage has 2.2.4 ?? I believe 2.2.x is their dev branch. We currently don't have any ebuilds for the 2.0.x branch. Closing this one as INVALID then. |
There is a sql injection in Xoops 2.0.14 (and maybe before versions) . One of the user inputs, is used in the sql query without proper checking : File /edituser.php, Line 347 : :: if (!empty($_POST['user_avatar'])) { >> $user_avatar = trim($_POST['user_avatar']); :: $criteria_avatar = new CriteriaCompo(new Criteria('avatar_file', $user_avatar)); :: $criteria_avatar->add(new Criteria('avatar_type', "S")); :: $avatars =& $avt_handler->getObjects($criteria_avatar); :: if (!is_array($avatars) || !count($avatars)) { :: $user_avatar = 'blank.gif'; :: } The bug can be critical, so no more info . You can upgrade to 2.0.15 . Also, a simple solution is to change line 348 of /edituser.php, to : $user_avatar = addslashes(trim($_POST['user_avatar']));