Bugzilla – Bug 675039
VUL-0: CVE-2011-0467: Studio: SQL injections
Last modified: 2018-03-05 15:29:49 UTC
from bnc#571584 Matthias Weckbecker 2011-02-25 09:43:05 UTC Andre, I haven't looked into the code in-depth, but doesn't " + SELECT #{options[:select]}" ... allow (if options[:select] is user-controllable) remote SQL-injections? We could not see it getting sanitized anywhere at the first glance.. Thank you in advance.
Fixed with commit 4793c80965
submitted request id 10919
CVE-2011-0467
Update released for: kiwi, kiwi-debuginfo, kiwi-debugsource, kiwi-desc-isoboot, kiwi-desc-netboot, kiwi-desc-oemboot, kiwi-desc-usbboot, kiwi-desc-vmxboot, kiwi-desc-xenboot, kiwi-doc, kiwi-instsource, kiwi-pxeboot, kiwi-pxeboot-prebuild, kiwi-tools, susestudio, susestudio-clicfs, susestudio-common, susestudio-debuginfo, susestudio-debugsource, susestudio-kiwi-runner, susestudio-masquerade, susestudio-rmds, susestudio-testdrive, susestudio-thoth, susestudio-ui-server Products: SLE-STUDIOONSITE 1.0 (x86_64)
Update released for: susestudio, susestudio-clicfs, susestudio-common, susestudio-debuginfo, susestudio-debugsource, susestudio-kiwi-runner, susestudio-masquerade, susestudio-rmds, susestudio-testdrive, susestudio-thoth, susestudio-ui-server Products: SLE-STUDIOONSITE 1.1 (x86_64)
all released