DefenseCode ThunderScan ASP.Net C# Advisory: BugTracker.Net Multiple
Security Vulnerabilities
Advisory ID: DC-2012-11-002
Advisory Title: BugTracker.Net Multiple Security Vulnerabilities
Advisory URL:
http://www.defensecode.com/article/bugtracker.net_multiple_security_vulnerabilities-31
Software: BugTracker.Net
Software Language: ASP.Net C#
Version: 3.5.8 and below
Vendor Status: Vendor contacted
Release Date: 2012-11-15
Risk: High
1. General Overview
===================
During the security audit of BugTracker.Net, multiple vulnerabilities
were discovered using DefenseCode ThunderScan ASP.Net C# web application
source code security analysis platform.
More information about ThunderScan ASP.Net C# is available at URL:
http://www.defensecode.com/subcategory/thunderscan-8
2. Software Overview
===================
BugTracker.NET is a free, open-source, web-based bug tracking and
general purpose issue tracking application. It is in daily use by
thousands of development, customer support, and help desk teams around
the world.
Homepage:
http://sourceforge.net/projects/btnet/
http://ifdefined.com/bugtrackernet.html
3. Brief Vulnerability Description
============================
During the security analysis, ThunderScan ASP.Net C# discovered multiple
SQL Injection, Cross Site Scripting and other vulnerabilities in
BugTracker.Net. Some of vulnerabilities are:
3.1 Cross Site Scripting through msg.InnerHtml()
File: default.aspx
Line: 88
Input variable: Request.QueryString["msg"]
Call stack (function line file)
msg.InnerHtml() 87 default.aspx
3.2 SQL Injection through SqlCommand()
File: dbutil.cs
Line: 57
Input variable: row_id.Value
Call stack (function line file)
SqlCommand() 56 dbutil.cs
execute_nonquery() 66 delete_customfield.aspx
3.3 SQL Injection through SqlDataAdapter()
File: dbutil.cs
Line: 141
Input variable: row_id.Value
Call stack (function line file):
SqlDataAdapter() 140 dbutil.cs
get_dataset() 174 dbutil.cs
get_datarow() 56 delete_report.aspx
3.4 File Disclosure through Response.WriteFile()
File: view_web_config.aspx
Line: 27
Input variable: Request
Call stack (function line file):
Response.WriteFile() 26 view_web_config.aspx
3.5 File Disclosure through System.IO.File.OpenText()
File: edit_custom_html.aspx
Line: 84
Input variable: Request["which"]
Stack (function line file):
System.IO.File.OpenText() 83 edit_custom_html.aspx
load_file_into_control() 73 edit_custom_html.aspx
3.6 Cross Site Scripting through Response.Write()
File: bug_list.cs
Line: 438
Input variable: Request["tags"]
Stack (function line file):
Response.Write() 437 bug_list.cs
3.7 Cross Site Scripting through Response.Write()
File: git_diff.aspx
Line: 92
Input variable: Request["rev_1"]
Stack (function line file):
Response.Write() 91 git_diff.aspx
Detailed report for each vulnerability can be found in the following PDF
report:
http://www.defensecode.com/public/BugTrackerNet_Security_Audit_Final_Report.pdf
Report has been generated by ThunderScan ASP.Net C# Web Application
Source Code Security Analysis.
4. Solution
=========
Vendor resolved security issues in latest BugTracker.Net release. All
users are strongly advised to update BugTracker.Net to the latest
available version 3.5.9.
5. About DefenseCode ThunderScan
================================
DefenseCode ThunderScan products are designed for comprehensive security
assessment of web application source code. ThunderScan products are
static source code analysis products for comprehensive security audit of
web applications.
Audit your web applications for SQL Injections, Cross Site Scripting,
Code Execution, File Inclusion, and much more.
Supported web application languages: ASP.Net C#, VB.Net, Classic ASP,
PHP and Java/JSP.
See ThunderScan in action:
http://www.youtube.com/watch?v=dcml2stPYNM&hd=1
ThunderScan: http://www.defensecode.com/subcategory/thunderscan-8
E-mail: defensecode[at]defensecode.com
Website: http://www.defensecode.com
{"id": "SECURITYVULNS:DOC:28838", "bulletinFamily": "software", "title": "[DC-2012-11-002] DefenseCode ThunderScan ASP.Net C# Advisory: BugTracker.Net Multiple Security Vulnerabilities", "description": "\r\nDefenseCode ThunderScan ASP.Net C# Advisory: BugTracker.Net Multiple\r\nSecurity Vulnerabilities\r\n\r\n\r\nAdvisory ID: DC-2012-11-002\r\nAdvisory Title: BugTracker.Net Multiple Security Vulnerabilities\r\nAdvisory URL:\r\nhttp://www.defensecode.com/article/bugtracker.net_multiple_security_vulnerabilities-31\r\nSoftware: BugTracker.Net\r\nSoftware Language: ASP.Net C#\r\nVersion: 3.5.8 and below\r\nVendor Status: Vendor contacted\r\nRelease Date: 2012-11-15\r\nRisk: High\r\n\r\n\r\n\r\n1. General Overview\r\n===================\r\nDuring the security audit of BugTracker.Net, multiple vulnerabilities\r\nwere discovered using DefenseCode ThunderScan ASP.Net C# web application\r\nsource code security analysis platform.\r\nMore information about ThunderScan ASP.Net C# is available at URL:\r\nhttp://www.defensecode.com/subcategory/thunderscan-8\r\n\r\n\r\n2. Software Overview\r\n===================\r\nBugTracker.NET is a free, open-source, web-based bug tracking and\r\ngeneral purpose issue tracking application. It is in daily use by\r\nthousands of development, customer support, and help desk teams around\r\nthe world.\r\nHomepage:\r\nhttp://sourceforge.net/projects/btnet/\r\nhttp://ifdefined.com/bugtrackernet.html\r\n\r\n\r\n3. Brief Vulnerability Description\r\n============================\r\nDuring the security analysis, ThunderScan ASP.Net C# discovered multiple\r\nSQL Injection, Cross Site Scripting and other vulnerabilities in\r\nBugTracker.Net. Some of vulnerabilities are:\r\n\r\n3.1 Cross Site Scripting through msg.InnerHtml()\r\nFile: default.aspx\r\nLine: 88\r\nInput variable: Request.QueryString["msg"]\r\nCall stack (function line file)\r\n msg.InnerHtml() 87 default.aspx\r\n\r\n3.2 SQL Injection through SqlCommand()\r\nFile: dbutil.cs\r\nLine: 57\r\nInput variable: row_id.Value\r\nCall stack (function line file)\r\n SqlCommand() 56 dbutil.cs\r\n execute_nonquery() 66 delete_customfield.aspx\r\n\r\n3.3 SQL Injection through SqlDataAdapter()\r\nFile: dbutil.cs\r\nLine: 141\r\nInput variable: row_id.Value\r\nCall stack (function line file):\r\n SqlDataAdapter() 140 dbutil.cs\r\n get_dataset() 174 dbutil.cs\r\n get_datarow() 56 delete_report.aspx\r\n\r\n3.4 File Disclosure through Response.WriteFile()\r\nFile: view_web_config.aspx\r\nLine: 27\r\nInput variable: Request\r\nCall stack (function line file):\r\n Response.WriteFile() 26 view_web_config.aspx\r\n\r\n3.5 File Disclosure through System.IO.File.OpenText()\r\nFile: edit_custom_html.aspx\r\nLine: 84\r\nInput variable: Request["which"]\r\nStack (function line file):\r\n System.IO.File.OpenText() 83 edit_custom_html.aspx\r\n load_file_into_control() 73 edit_custom_html.aspx\r\n\r\n3.6 Cross Site Scripting through Response.Write()\r\nFile: bug_list.cs\r\nLine: 438\r\nInput variable: Request["tags"]\r\nStack (function line file):\r\n Response.Write() 437 bug_list.cs\r\n\r\n3.7 Cross Site Scripting through Response.Write()\r\nFile: git_diff.aspx\r\nLine: 92\r\nInput variable: Request["rev_1"]\r\nStack (function line file):\r\n Response.Write() 91 git_diff.aspx\r\n\r\nDetailed report for each vulnerability can be found in the following PDF\r\nreport:\r\nhttp://www.defensecode.com/public/BugTrackerNet_Security_Audit_Final_Report.pdf\r\n\r\nReport has been generated by ThunderScan ASP.Net C# Web Application\r\nSource Code Security Analysis.\r\n\r\n\r\n4. Solution\r\n=========\r\nVendor resolved security issues in latest BugTracker.Net release. All\r\nusers are strongly advised to update BugTracker.Net to the latest\r\navailable version 3.5.9.\r\n\r\n\r\n5. About DefenseCode ThunderScan\r\n================================\r\nDefenseCode ThunderScan products are designed for comprehensive security\r\nassessment of web application source code. ThunderScan products are\r\nstatic source code analysis products for comprehensive security audit of\r\nweb applications.\r\nAudit your web applications for SQL Injections, Cross Site Scripting,\r\nCode Execution, File Inclusion, and much more.\r\nSupported web application languages: ASP.Net C#, VB.Net, Classic ASP,\r\nPHP and Java/JSP.\r\nSee ThunderScan in action:\r\nhttp://www.youtube.com/watch?v=dcml2stPYNM&hd=1\r\n\r\nThunderScan: http://www.defensecode.com/subcategory/thunderscan-8\r\nE-mail: defensecode[at]defensecode.com\r\nWebsite: http://www.defensecode.com\r\n", "published": "2012-12-10T00:00:00", "modified": "2012-12-10T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28838", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:46", "edition": 1, "viewCount": 15, "enchantments": {"score": {"value": 1.6, "vector": "NONE"}, "dependencies": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12763"]}], "rev": 4}, "backreferences": {}, "exploitation": null, "vulnersScore": 1.6}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645597557}}