SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://www.slashcode.com/article.pl?sid=08/01/07/2314232 | |
http://secunia.com/advisories/31691 | third party advisory |
http://www.securitytracker.com/id?1020206 | vdb entry |
http://marc.info/?l=oss-security&m=121260265427728&w=2 | mailing list |
http://marc.info/?l=oss-security&m=121258731028005&w=2 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42880 | vdb entry |
http://securityreason.com/securityalert/3923 | third party advisory |
http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223&r2=1.225 | |
http://www.slashcode.com/article.pl?sid=08/01/04/1950244&tid=4 | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499 | |
http://www.debian.org/security/2008/dsa-1633 | vendor advisory |
http://secunia.com/advisories/30551 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/29548 | vdb entry |