CVE-2007-1329
Publication date 7 March 2007
Last updated 24 July 2024
Ubuntu priority
Directory traversal vulnerability in SQL-Ledger, and LedgerSMB before 1.1.5, allows remote attackers to read and overwrite arbitrary files, and execute arbitrary code, via . (dot) characters adjacent to (1) users and (2) users/members strings, which are removed by blacklisting functions that filter these strings and collapse into .. (dot dot) sequences.
Status
Package | Ubuntu Release | Status |
---|---|---|
sql-ledger | 22.04 LTS jammy | Not in release |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Ignored see notes | |
14.04 LTS trusty | Not in release | |
Notes
ebarretto
According to Debian: “It’s documented behaviour that SQL-Ledger should only be run in an authenticated HTTP zone and without untrusted users” Setting esm-apps/xenial to ignored