CVE-2009-4402 CVE-2009-3580 CVE-2009-3581 CVE-2009-3582 CVE-2009-3583 CVE-2009-3584

Related Vulnerabilities: CVE-2009-4402   CVE-2009-3580   CVE-2009-3581   CVE-2009-3582   CVE-2009-3583   CVE-2009-3584  

Debian Bug report logs - #562639
CVE-2009-4402 CVE-2009-3580 CVE-2009-3581 CVE-2009-3582 CVE-2009-3583 CVE-2009-3584

version graph

Reported by: Giuseppe Iuculano <iuculano@debian.org>

Date: Sat, 26 Dec 2009 18:06:01 UTC

Severity: important

Tags: security

Fixed in version 2.8.32-1

Done: Nikolai Lusan <nikolai@lusan.id.au>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Raphaël Hertzog <hertzog@debian.org>:
Bug#562639; Package sql-ledger. (Sat, 26 Dec 2009 18:06:04 GMT) (full text, mbox, link).


Acknowledgement sent to Giuseppe Iuculano <iuculano@debian.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Raphaël Hertzog <hertzog@debian.org>. (Sat, 26 Dec 2009 18:06:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Giuseppe Iuculano <iuculano@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2009-4402 CVE-2009-3580 CVE-2009-3581 CVE-2009-3582 CVE-2009-3583 CVE-2009-3584
Date: Sat, 26 Dec 2009 19:04:35 +0100
Package: sql-ledger
Severity: grave
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for sql-ledger.

CVE-2009-4402[0]:
| The default configuration of SQL-Ledger 2.8.24 allows remote attackers
| to perform unspecified administrative operations by providing an
| arbitrary password to the admin interface.

CVE-2009-3580[1]:
| Cross-site request forgery (CSRF) vulnerability in am.pl in SQL-Ledger
| 2.8.24 allows remote attackers to hijack the authentication of
| arbitrary users for requests that change a password via the login,
| new_password, and confirm_password parameters in a preferences action.

CVE-2009-3581[2]:
| Multiple cross-site scripting (XSS) vulnerabilities in SQL-Ledger
| 2.8.24 allow remote authenticated users to inject arbitrary web script
| or HTML via (1) the DCN Description field in the Accounts Receivables
| menu item for Add Transaction, (2) the Description field in the
| Accounts Payable menu item for Add Transaction, or the name field in
| (3) the Customers menu item for Add Customer or (4) the Vendor menu
| item for Add Vendor.

CVE-2009-3582[3]:
| Multiple SQL injection vulnerabilities in the delete subroutine in
| SQL-Ledger 2.8.24 allow remote authenticated users to execute
| arbitrary SQL commands via the (1) id and possibly (2) db parameters
| in a Delete action to the output of a Vendors&gt;Reports&gt;Search search
| operation.

CVE-2009-3583[4]:
| Directory traversal vulnerability in the Preferences menu item in
| SQL-Ledger 2.8.24 allows remote attackers to include and execute
| arbitrary local files via a .. (dot dot) in the countrycode field.

CVE-2009-3584[5]:
| SQL-Ledger 2.8.24 does not set the secure flag for the session cookie
| in an https session, which makes it easier for remote attackers to
| capture this cookie by intercepting its transmission within an http
| session.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4402
    http://security-tracker.debian.org/tracker/CVE-2009-4402
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3580
    http://security-tracker.debian.org/tracker/CVE-2009-3580
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3581
    http://security-tracker.debian.org/tracker/CVE-2009-3581
[3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3582
    http://security-tracker.debian.org/tracker/CVE-2009-3582
[4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3583
    http://security-tracker.debian.org/tracker/CVE-2009-3583
[5] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3584
    http://security-tracker.debian.org/tracker/CVE-2009-3584


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAks2UC4ACgkQNxpp46476aqnFgCcDTCmNFfWryCQzP8BdtX+offK
NJMAn270NMaZzk7L00r7HWDMrCOGhe1D
=qtdH
-----END PGP SIGNATURE-----




Information forwarded to debian-bugs-dist@lists.debian.org, Raphaël Hertzog <hertzog@debian.org>:
Bug#562639; Package sql-ledger. (Wed, 13 Jan 2010 10:39:08 GMT) (full text, mbox, link).


Acknowledgement sent to Raphael Hertzog <hertzog@debian.org>:
Extra info received and forwarded to list. Copy sent to Raphaël Hertzog <hertzog@debian.org>. (Wed, 13 Jan 2010 10:39:08 GMT) (full text, mbox, link).


Message #10 received at 562639@bugs.debian.org (full text, mbox, reply):

From: Raphael Hertzog <hertzog@debian.org>
To: Giuseppe Iuculano <iuculano@debian.org>, 562639@bugs.debian.org
Subject: Re: Bug#562639: CVE-2009-4402 CVE-2009-3580 CVE-2009-3581 CVE-2009-3582 CVE-2009-3583 CVE-2009-3584
Date: Wed, 13 Jan 2010 11:36:17 +0100
severity 562639 important
thanks

> Hi,
> the following CVE (Common Vulnerabilities & Exposures) ids were
> published for sql-ledger.

The package is clearly identified as being usable only in trusted
environments, and it's tagged secteam::lenny-limited-support.

Thus it doesn't warrant a grave severity. Given that upstream doesn't
care at all, it's quite possible that some of them are fixed but we don't
know and most reports do not come with simple test cases or with patches
so there's not much I can do except if I spend countless hours reproducing
the issues and writing patches myself (which I won't).

Cheers,
-- 
Raphaël Hertzog




Severity set to 'important' from 'grave' Request was from Raphael Hertzog <hertzog@debian.org> to control@bugs.debian.org. (Wed, 13 Jan 2010 10:39:12 GMT) (full text, mbox, link).


Reply sent to Nikolai Lusan <nikolai@lusan.id.au>:
You have taken responsibility. (Wed, 20 Jun 2012 10:30:25 GMT) (full text, mbox, link).


Notification sent to Giuseppe Iuculano <iuculano@debian.org>:
Bug acknowledged by developer. (Wed, 20 Jun 2012 10:30:29 GMT) (full text, mbox, link).


Message #17 received at 562639-done@bugs.debian.org (full text, mbox, reply):

From: Nikolai Lusan <nikolai@lusan.id.au>
To: 562639-done@bugs.debian.org
Subject: Version: 2.8.32-1
Date: Wed, 20 Jun 2012 20:27:17 +1000
[Message part 1 (text/plain, inline)]
Version: 2.8.32-1

This bug was closed in the upstream release 2.8.32 and in the subsequent
Debian package 2.8.32-1. Marked in the upstream Changelog as "fixed SQL
injection"
-- 
Nikolai Lusan <nikolai@lusan.id.au>
[signature.asc (application/pgp-signature, inline)]

Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 19 Jul 2012 07:29:18 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 14:43:18 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.