121 lines
No EOL
4.1 KiB
Text
121 lines
No EOL
4.1 KiB
Text
source: http://www.securityfocus.com/archive/1/509995
|
|
|
|
======================================================================
|
|
|
|
Secunia Research 10/03/2010
|
|
|
|
- Employee Timeclock Software SQL Injection Vulnerabilities -
|
|
|
|
======================================================================
|
|
Table of Contents
|
|
|
|
Affected Software....................................................1
|
|
Severity.............................................................2
|
|
Vendor's Description of Software.....................................3
|
|
Description of Vulnerability.........................................4
|
|
Solution.............................................................5
|
|
Time Table...........................................................6
|
|
Credits..............................................................7
|
|
References...........................................................8
|
|
About Secunia........................................................9
|
|
Verification........................................................10
|
|
|
|
======================================================================
|
|
1) Affected Software
|
|
|
|
* Employee Timeclock Software 0.99
|
|
|
|
NOTE: Other versions may also be affected.
|
|
|
|
======================================================================
|
|
2) Severity
|
|
|
|
Rating: Moderately critical
|
|
Impact: Manipulation of data
|
|
Where: Remote
|
|
|
|
======================================================================
|
|
3) Vendor's Description of Software
|
|
|
|
"Timeclock-software.net's free software product will be a simple
|
|
solution to allow your employees to record their time in one central
|
|
location for easy access.".
|
|
|
|
Product Link:
|
|
http://timeclock-software.net/
|
|
|
|
======================================================================
|
|
4) Description of Vulnerability
|
|
|
|
Secunia Research has discovered some vulnerabilities in Employee
|
|
Timeclock Software, which can be exploited by malicious people to
|
|
conduct SQL injection attacks.
|
|
|
|
Input passed to the "username" and "password" parameters in auth.php
|
|
and login_action.php is not properly sanitised before being used in
|
|
SQL queries. This can be exploited to manipulate SQL queries by
|
|
injecting arbitrary SQL code.
|
|
|
|
======================================================================
|
|
5) Solution
|
|
|
|
Edit the source code to ensure that input is properly sanitised.
|
|
|
|
======================================================================
|
|
6) Time Table
|
|
|
|
25/02/2010 - Vendor notified.
|
|
04/03/2010 - Vendor notified again.
|
|
10/03/2010 - Public disclosure.
|
|
|
|
======================================================================
|
|
7) Credits
|
|
|
|
Discovered by Secunia Research.
|
|
|
|
======================================================================
|
|
8) References
|
|
|
|
The Common Vulnerabilities and Exposures (CVE) project has assigned
|
|
CVE-2010-0122 for the vulnerability.
|
|
|
|
======================================================================
|
|
9) About Secunia
|
|
|
|
Secunia offers vulnerability management solutions to corporate
|
|
customers with verified and reliable vulnerability intelligence
|
|
relevant to their specific system configuration:
|
|
|
|
http://secunia.com/advisories/business_solutions/
|
|
|
|
Secunia also provides a publicly accessible and comprehensive advisory
|
|
database as a service to the security community and private
|
|
individuals, who are interested in or concerned about IT-security.
|
|
|
|
http://secunia.com/advisories/
|
|
|
|
Secunia believes that it is important to support the community and to
|
|
do active vulnerability research in order to aid improving the
|
|
security and reliability of software in general:
|
|
|
|
http://secunia.com/secunia_research/
|
|
|
|
Secunia regularly hires new skilled team members. Check the URL below
|
|
to see currently vacant positions:
|
|
|
|
http://secunia.com/corporate/jobs/
|
|
|
|
Secunia offers a FREE mailing list called Secunia Security Advisories:
|
|
|
|
http://secunia.com/advisories/mailing_lists/
|
|
|
|
======================================================================
|
|
10) Verification
|
|
|
|
Please verify this advisory by visiting the Secunia website:
|
|
http://secunia.com/secunia_research/2010-11/
|
|
|
|
Complete list of vulnerability reports published by Secunia Research:
|
|
http://secunia.com/secunia_research/
|
|
|
|
====================================================================== |