Package: dbmail-pgsql
Version: 1.2.11
Severity: grave
Tags: security
Justification: user security hole
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
In pgsql/dbauthpgsql.c escaping is not consistent. Sometimes username and
other user supplied values are escaped and sometimes like in:
auth_check_user(...)
auth_check_user_ext(...)
auth_adduser(...)
auth_delete_user(...)
they are not. This most likely opens ways sql injection.
I don't have proof of concept yet, so if this doesn't look exploitable to
you at first glance, please close it and I'll resubmit it when I finish PoC.
Best regards,
Primoz
- -- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-1-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
iD8DBQFB6xk+HOuqnSwJthERAjDgAKCUymqECSMx0/c2p9P+zO7Bdn2zWQCeMLZF
IWWvdB8kL1HOs/Hc0JNCUW0=
=GoHo
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]