Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title New acidlab packages fix SQL injection
Informations
Name DSA-893 First vendor Publication 2005-11-14
Vendor Debian Last vendor Modification 2005-11-14
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Remco Verhoef has discovered a vulnerability in acidlab, Analysis Console for Intrusion Databases, and in acidbase, Basic Analysis and Security Engine, which can be exploited by malicious users to conduct SQL injection attacks.

The maintainers of Analysis Console for Intrusion Databases (ACID) in Debian, of which BASE is a fork off, after a security audit of both BASE and ACID have determined that the flaw found not only affected the base_qry_main.php (in BASE) or acid_qry_main.php (in ACID) component but was also found in other elements of the consoles due to improper parameter validation and filtering.

All the SQL injection bugs and Cross Site Scripting bugs found have been fixed in the Debian package, closing all the different attack vendors detected.

For the old stable distribution (woody) this problem has been fixed in version 0.9.6b20-2.1.

For the stable distribution (sarge) this problem has been fixed in version 0.9.6b20-10.1.

For the unstable distribution (sid) this problem has been fixed in version 0.9.6b20-13 and in version 1.2.1-1 of acidbase.

We recommend that you upgrade your acidlab and acidbase package.

Original Source

Url : http://www.debian.org/security/2005/dsa-893

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)
50 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1

OpenVAS Exploits

Date Description
2008-09-04 Name : FreeBSD Ports: base
File : nvt/freebsd_base.nasl
2008-01-17 Name : Debian Security Advisory DSA 893-1 (acidlab)
File : nvt/deb_893_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
24306 Basic Analysis and Security Engine (BASE) base_qry_main.php sig[1] Parameter XSS

Basic Analysis and Security Engine (BASE) contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'sig[1]' variable upon submission to base_qry_main.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
20837 Analysis Console for Intrusion Databases (ACID) acid_qry_main.php sig[1] Para...

Analysis Console for Intrusion Databases (ACID) contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'sig[1]' variable upon submission to acid_qry_main.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
20836 Analysis Console for Intrusion Databases (ACID) acid_qry_main.php sig[1] Para...

Analysis Console for Intrusion Databases (ACID) contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the acid_qry_main.php script not properly sanitizing user-supplied input to the 'sig[1]' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
20304 Basic Analysis and Security Engine (BASE) base_qry_main.php sig[1] Parameter ...

Basic Analysis and Security Engine (BASE) contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the base_qry_main.php script not properly sanitizing user-supplied input to the 'sig[1]' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.

Nessus® Vulnerability Scanner

Date Description
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-893.nasl - Type : ACT_GATHER_INFO
2006-05-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_f38c87a54a3e11da8ba20004614cc33d.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:34:38
  • Multiple Updates