Vulnerabilities > CVE-2007-0347 - Unspecified vulnerability in Cvstrac
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The is_eow function in format.c in CVSTrac before 2.0.1 does not properly check for the "'" (quote) character, which allows remote authenticated users to execute limited SQL injection attacks and cause a denial of service (database error) via a ' character in certain messages, tickets, or Wiki entries.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Exploit-Db
description | CVSTrac 2.0.0 Post-Attack Database Resurrection DoS Exploit. CVE-2007-0347. Dos exploit for cgi platform |
id | EDB-ID:3223 |
last seen | 2016-01-31 |
modified | 2007-01-29 |
published | 2007-01-29 |
reporter | Ralf S. Engelschall |
source | https://www.exploit-db.com/download/3223/ |
title | CVSTrac 2.0.0 - Post-Attack Database Resurrection DoS Exploit |
Nessus
NASL family | CGI abuses |
NASL id | CVSTRAC_OUTPUT_FORMATTER_DOS.NASL |
description | According to its version number, the version of CVSTrac installed on the remote host contains a flaw related to its Wiki-style text output formatter that may allow an attacker to cause a partial denial of service, depending on the pages requested, via limited SQL injection. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24263 |
published | 2007-01-30 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24263 |
title | CVSTrac Text Output Formatter SQL Injection DoS |
code |
|
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052058.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052058.html
- http://osvdb.org/31935
- http://osvdb.org/31935
- http://secunia.com/advisories/23940
- http://secunia.com/advisories/23940
- http://securityreason.com/securityalert/2192
- http://securityreason.com/securityalert/2192
- http://www.cvstrac.org/cvstrac/chngview?cn=850
- http://www.cvstrac.org/cvstrac/chngview?cn=850
- http://www.cvstrac.org/cvstrac/tktview?tn=683
- http://www.cvstrac.org/cvstrac/tktview?tn=683
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.008.html
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.008.html
- http://www.securityfocus.com/archive/1/458455/100/0/threaded
- http://www.securityfocus.com/archive/1/458455/100/0/threaded
- http://www.securityfocus.com/bid/22296
- http://www.securityfocus.com/bid/22296
- http://www.vupen.com/english/advisories/2007/0398
- http://www.vupen.com/english/advisories/2007/0398