Package: dbmail-pgsql
Version: 1.2.11
Severity: grave
Tags: security
Justification: user security hole

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In pgsql/dbauthpgsql.c escaping is not consistent. Sometimes username and
other user supplied values are escaped and sometimes like in:

        auth_check_user(...)
        auth_check_user_ext(...)
        auth_adduser(...)
        auth_delete_user(...)
        

they are not. This most likely opens ways sql injection. 

I don't have proof of concept yet, so if this doesn't look exploitable to
you at first glance, please close it and I'll resubmit it when I finish PoC.


Best regards,

Primoz



- -- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-1-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFB6xk+HOuqnSwJthERAjDgAKCUymqECSMx0/c2p9P+zO7Bdn2zWQCeMLZF
IWWvdB8kL1HOs/Hc0JNCUW0=
=GoHo
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to