FS#7883 - Possible SQL injection vulnerabilities
Attached to Project:
AUR web interface
Opened by . (Thralas) - Thursday, 23 August 2007, 22:04 GMT
Last edited by Roman Kyrylych (Romashka) - Thursday, 04 October 2007, 17:46 GMT
Opened by . (Thralas) - Thursday, 23 August 2007, 22:04 GMT
Last edited by Roman Kyrylych (Romashka) - Thursday, 04 October 2007, 17:46 GMT
|
Details
Whilst going through the AUR SVN trunk code I've discovered
some potential SQL injection vulnerabilities. The severity
depends on magic_quotes - possibly 'preventing' exploitation
if it's turned on. Another limit may be the maximum of 32
injectable characters.
I can at least confirm this issue on my local copy of the AUR - revision 356, magic_quotes off (pretty much default). A malicious user may register using a username containing a SQL injection string - which is properly escaped and inserted into the database at registration. However upon displaying index.php (as the logged-in attacker) the username is used unsanitized in a query. A quick and dirty fix can be found in my git repository - I'm a bit short of time currently, I'm not yet done going through the code. [url=http://ius.student.utwente.nl/cgi-bin/gitweb.cgi?p=aur/.git;a=commitdiff;h=aa48302e539e91845970c229c5a3c030185c72fc;hp=4ae07bfb3e7491ac8a261ee9d0af8f5e151ff2fa]Fix diff[/url] (against the latest SVN trunk revision) |
This task depends upon
/me goes sifting through code.
For the time being, can we get the AUR site synced to the latest revision? It does fix some small bugs.
[1] = http://ius.student.utwente.nl/cgi-bin/gitweb.cgi?p=aur/.git;a=commitdiff;h=aa48302e539e91845970c229c5a3c030185c72fc
[2] = http://ius.student.utwente.nl/cgi-bin/gitweb.cgi?p=aur/.git;a=commitdiff;h=4ae07bfb3e7491ac8a261ee9d0af8f5e151ff2fa