Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html - | |
References | () http://osvdb.org/100432 - | |
References | () http://quassel-irc.org/node/123 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/55640 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2013/11/28/8 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/89377 - | |
References | () https://github.com/quassel/quassel/commit/a1a24da - Exploit, Patch |
Information
Published : 2013-12-09 16:36
Updated : 2024-11-21 01:59
NVD link : CVE-2013-6404
Mitre link : CVE-2013-6404
CVE.ORG link : CVE-2013-6404
JSON object : View
Products Affected
quassel-irc
- quassel_irc
CWE
CWE-264
Permissions, Privileges, and Access Controls