Computer Security
[EN] securityvulns.ru no-pyccku


quassel SQL injection
Published:12.05.2015
Source:
SecurityVulns ID:14488
Type:remote
Threat Level:
6/10
Description:SQL injection via messages.
Affected:QUASSEL : Quassel IRC 0.9
CVE:CVE-2015-3427 (Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.)
 CVE-2013-4422 (SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later and PostgreSQL 8.2 or later are used, allows remote attackers to execute arbitrary SQL commands via a \ (backslash) in a message.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 3258-1] quassel security update (12.05.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod