Executive Summary
Summary | |
---|---|
Title | New acidlab packages fix SQL injection |
Informations | |||
---|---|---|---|
Name | DSA-893 | First vendor Publication | 2005-11-14 |
Vendor | Debian | Last vendor Modification | 2005-11-14 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Remco Verhoef has discovered a vulnerability in acidlab, Analysis Console for Intrusion Databases, and in acidbase, Basic Analysis and Security Engine, which can be exploited by malicious users to conduct SQL injection attacks. The maintainers of Analysis Console for Intrusion Databases (ACID) in Debian, of which BASE is a fork off, after a security audit of both BASE and ACID have determined that the flaw found not only affected the base_qry_main.php (in BASE) or acid_qry_main.php (in ACID) component but was also found in other elements of the consoles due to improper parameter validation and filtering. All the SQL injection bugs and Cross Site Scripting bugs found have been fixed in the Debian package, closing all the different attack vendors detected. For the old stable distribution (woody) this problem has been fixed in version 0.9.6b20-2.1. For the stable distribution (sarge) this problem has been fixed in version 0.9.6b20-10.1. For the unstable distribution (sid) this problem has been fixed in version 0.9.6b20-13 and in version 1.2.1-1 of acidbase. We recommend that you upgrade your acidlab and acidbase package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-893 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
50 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-04 | Name : FreeBSD Ports: base File : nvt/freebsd_base.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 893-1 (acidlab) File : nvt/deb_893_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
24306 | Basic Analysis and Security Engine (BASE) base_qry_main.php sig[1] Parameter XSS Basic Analysis and Security Engine (BASE) contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'sig[1]' variable upon submission to base_qry_main.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
20837 | Analysis Console for Intrusion Databases (ACID) acid_qry_main.php sig[1] Para... Analysis Console for Intrusion Databases (ACID) contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'sig[1]' variable upon submission to acid_qry_main.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
20836 | Analysis Console for Intrusion Databases (ACID) acid_qry_main.php sig[1] Para... Analysis Console for Intrusion Databases (ACID) contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the acid_qry_main.php script not properly sanitizing user-supplied input to the 'sig[1]' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
20304 | Basic Analysis and Security Engine (BASE) base_qry_main.php sig[1] Parameter ... Basic Analysis and Security Engine (BASE) contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the base_qry_main.php script not properly sanitizing user-supplied input to the 'sig[1]' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-893.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_f38c87a54a3e11da8ba20004614cc33d.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:38 |
|