Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://github.com/quassel/quassel/commit/a1a24da | patch exploit |
http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2013/11/28/8 | mailing list |
http://quassel-irc.org/node/123 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/89377 | vdb entry |
http://secunia.com/advisories/55640 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html | vendor advisory |
http://osvdb.org/100432 | vdb entry |