[Secure-testing-team] Bug#562639: CVE-2009-4402 CVE-2009-3580 CVE-2009-3581 CVE-2009-3582 CVE-2009-3583 CVE-2009-3584

Giuseppe Iuculano iuculano at debian.org
Sat Dec 26 18:04:35 UTC 2009


Package: sql-ledger
Severity: grave
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for sql-ledger.

CVE-2009-4402[0]:
| The default configuration of SQL-Ledger 2.8.24 allows remote attackers
| to perform unspecified administrative operations by providing an
| arbitrary password to the admin interface.

CVE-2009-3580[1]:
| Cross-site request forgery (CSRF) vulnerability in am.pl in SQL-Ledger
| 2.8.24 allows remote attackers to hijack the authentication of
| arbitrary users for requests that change a password via the login,
| new_password, and confirm_password parameters in a preferences action.

CVE-2009-3581[2]:
| Multiple cross-site scripting (XSS) vulnerabilities in SQL-Ledger
| 2.8.24 allow remote authenticated users to inject arbitrary web script
| or HTML via (1) the DCN Description field in the Accounts Receivables
| menu item for Add Transaction, (2) the Description field in the
| Accounts Payable menu item for Add Transaction, or the name field in
| (3) the Customers menu item for Add Customer or (4) the Vendor menu
| item for Add Vendor.

CVE-2009-3582[3]:
| Multiple SQL injection vulnerabilities in the delete subroutine in
| SQL-Ledger 2.8.24 allow remote authenticated users to execute
| arbitrary SQL commands via the (1) id and possibly (2) db parameters
| in a Delete action to the output of a Vendors>Reports>Search search
| operation.

CVE-2009-3583[4]:
| Directory traversal vulnerability in the Preferences menu item in
| SQL-Ledger 2.8.24 allows remote attackers to include and execute
| arbitrary local files via a .. (dot dot) in the countrycode field.

CVE-2009-3584[5]:
| SQL-Ledger 2.8.24 does not set the secure flag for the session cookie
| in an https session, which makes it easier for remote attackers to
| capture this cookie by intercepting its transmission within an http
| session.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4402
    http://security-tracker.debian.org/tracker/CVE-2009-4402
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3580
    http://security-tracker.debian.org/tracker/CVE-2009-3580
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3581
    http://security-tracker.debian.org/tracker/CVE-2009-3581
[3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3582
    http://security-tracker.debian.org/tracker/CVE-2009-3582
[4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3583
    http://security-tracker.debian.org/tracker/CVE-2009-3583
[5] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3584
    http://security-tracker.debian.org/tracker/CVE-2009-3584


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAks2UC4ACgkQNxpp46476aqnFgCcDTCmNFfWryCQzP8BdtX+offK
NJMAn270NMaZzk7L00r7HWDMrCOGhe1D
=qtdH
-----END PGP SIGNATURE-----





More information about the Secure-testing-team mailing list