Package: trac
Version: 0.9-1
Severity: grave
Tags: security
Justification: user security hole

As reported on Bugtraq[0]:

Malicious user can conduct SQL injection in ticket query module
because supplied 'group' URI data passed to the query script
is not properly sanitized.

PoC:

http://host/trac/query?group=/*

Vulnerable version:

Version tested is 0.9
Maybe 0.9 betas are also vulnerable

Solution:

Upgrade to version 0.9.1
http://projects.edgewall.com/trac/wiki/TracDownload

Cheers,

Dominic.

[0] http://www.securityfocus.com/archive/1/418294/30/0/threaded


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to