Package: dbmail-mysql
Version: 1.2.11-1
Severity: grave
Tags: security
Justification: user security hole


Initially spotted as I'd tried to set up an account with an owner name of
"Familly" and was being told that "Familly" was not a valid column in
the table. Further investigation of the source code showed no escaping
of user supplied data. I was using md5 passwords, so perhaps a quote or
something managed to get into the query.

I've downloaded version 2 from the upstream site and a lot of work has
been done on this so I'm far happier to use that. The package design
looks quite solid. I'd have still preferred parameterised queries as
that's a lot more bulletproof. Version 2's database access has been
spread around a little more so it's harder to retrofit that there
(will take a bit more code reading to work out how best).  I don't know
whether or not MySQL or Postgress would take advantage of query caching
if parameterised queries are used.

Thanks

 - Richard

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.11-mm4
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)

Versions of packages dbmail-mysql depends on:
ii  debconf                     1.4.47       Debian configuration management sy
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libmysqlclient10            3.23.56-2    LGPL-licensed client library for M
ii  ucf                         1.17         Update Configuration File: preserv


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to