Headline
CVE-2021-42235: security: SQL Injection · osTicket/osTicket@e282910
SQL injection in osTicket before 1.14.8 and 1.15.4 login and password reset process allows attackers to access the osTicket administration profile functionality.
@@ -220,11 +220,18 @@ static function is_ip($ip, &$error=’’) {
static function is_username($username, &$error=’’) {
if (strlen($username)<2)
$error = __(‘Username must have at least two (2) characters’);
elseif (!preg_match('/^[\p{L}\d._-]+$/u’, $username))
elseif (is_numeric($username) || !preg_match('/^[\p{L}\d._-]+$/u’, $username))
$error = __(‘Username contains invalid characters’);
return $error == '’;
}
static function is_userid($userid, &$error=’’) {
if (!self::is_username($userid)
&& !self::is_email($userid))
$error = __('Invalid User Id ');
return $error == '’;
}
static function is_formula($text, &$error=’’) {
if (!preg_match('/^[^=\+@-].*$/s’, $text))
$error = __(‘Content cannot start with the following characters: = - + @’);
Related news
GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad.
In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.
DOM XSS in microweber ver 1.2.15 in GitHub repository microweber/microweber prior to 1.2.16. inject arbitrary js code, deface website, steal cookie...