This is a short notice thatan independen security researcher has found:
We confirm this issues in general.
The attacks can be executed remotely and require that attacker is a registered user.
Probably all versions of ]po[ are affected, from 3.3 to 5.0.3.
We will fix these issues and let you know about it ASAP.
Bests
Frank
Hi,
We have developed a patch for the most serious SQL injection vulnerability found in the report.
Please contact info@project-open.com for details.
We would consider the other (non-persistent XSS) vulnerability as not that critical, because:
1. Quite some knowledge is required to create a suitable URLs,
2. most ]po[ systems run locally and
3. an attacker would have to make the victim click on a forged link.
In order to consistently fix the XSS issues, we would have to update the OpenACS core version to 5.10 and to perform a considerable of changes in the ]po[ code with the possibility of errors.
So we have decided to speed-up the development of ]po[ V5.1 with focus only on these issues.
Best regards
Frank