Package: trac Version: 0.9-1 Severity: grave Tags: security Justification: user security hole
As reported on Bugtraq[0]: Malicious user can conduct SQL injection in ticket query module because supplied 'group' URI data passed to the query script is not properly sanitized. PoC: http://host/trac/query?group=/* Vulnerable version: Version tested is 0.9 Maybe 0.9 betas are also vulnerable Solution: Upgrade to version 0.9.1 http://projects.edgewall.com/trac/wiki/TracDownload Cheers, Dominic. [0] http://www.securityfocus.com/archive/1/418294/30/0/threaded -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]