BugTracker.net 3.4.3 SQL Injection
Name BugTracker.NET Vendor http://www.ifdefined.com/www/ Versions Affected < 3.4.4 (when custom fields are used)
Author Mark van Tilburg Website http://markvt.info Contact markvantilburg [at] gmail [dot] com Date 2010-08-22
I. ABOUT THE APPLICATION II. DESCRIPTION III. ANALYSIS IV. SAMPLE CODE V. FIX VI. Dates
I. ABOUT THE APPLICATION
A web-based bug or issue tracker written using ASP.NET, C#, and SQL Server (SQL Server Express too). Probably has all the features you need. Easy to setup. Power and flexibility when you need it. Learn more at http://ifdefined.com/bugtrackernet.html
A parameter is not properly sanitised before being used in SQL queries.
If no custom fields are used this vulnerability cannot be misused.
A) SQL Injection
The application allows the use of Custom Fields, searching of these custom fields is possible on the search page. The value used for searching the custom field is not properly cleaned before being used in the SQL query.
Please note this vulnerability is in the code lot for a long time if using BugTracker.NET publicly you could be vulnerable.
IV. SAMPLE CODE
Use ' in the search box of a custom field
A) Don't use custom fields
B) Upgrade to v3.4.4 (http://sourceforge.net/projects/btnet/files/)
C) Or do the fix manually by following the steps at: http://btnet.svn.sourceforge.net/viewvc/btnet/www/search.aspx?r1=559&r2=566
Reported to author: 2010-08-20 Acknowledge by author: 2010-08-20 Fixed by author: 2010-08-22