Package: dtc-common
Version: 0.32.10-2
Severity: important
Tags: upstream, security

The two logPushlet.php pages do not sanitize input allowing for SQL injection.

as an example, going to a url like:

http://127.0.0.1/dtcadmin/logPushlet.php?vps_node='%20or%201%20into%20outfile%20'/tmp/kilroy

will create a /tmp/kilroy file on the server using the mysql server credentials.

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (600, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to