Re: [FD] cpio privilege escalation vulnerability via setuid files in cpio archive

2024-01-14 Thread Harry Sintonen via Fulldisclosure
On Tue, 9 Jan 2024, Georgi Guninski wrote: On Tue, Jan 9, 2024 at 12:45 AM Harry Sintonen wrote: On Mon, 8 Jan 2024, Georgi Guninski wrote: When extracting archives cpio (at least version 2.13) preserves the setuid flag, which might lead to privilege escalation. So does for example tar

Re: [FD] cpio privilege escalation vulnerability via setuid files in cpio archive

2024-01-14 Thread Harry Sintonen via Fulldisclosure
On Mon, 8 Jan 2024, Georgi Guninski wrote: When extracting archives cpio (at least version 2.13) preserves the setuid flag, which might lead to privilege escalation. So does for example tar. The same rules that apply to tar also apply to cpio: "Extract from an untrusted archive only into an

[FD] NiceHash Miner Excavator API Cross-Site Request Forgery

2021-05-18 Thread Harry Sintonen via Fulldisclosure
ns 1. Upgrade to the NiceHash Miner 3.0.6.5 or later. Credits --- The vulnerability was discovered by Harry Sintonen / F-Secure Consulting. Timeline 2021.03.28 discovered the vulnerability 2021.03.28 wrote a proof of concept exploit 2021.03.28

[FD] D-Link DGS-1250 header injection vulnerability

2020-02-20 Thread Harry Sintonen via Fulldisclosure
ends up in the HTTP response headers. In particular do not allow linefeed characters (ASCII characters 10 and 13) as-is. End user mitigation --- 1. Use a dedicated browser session to access the web user interface. Credits --- The vulnerability was discovered by

[FD] SCP client multiple vulnerabilities

2019-01-15 Thread Harry Sintonen
ps://www.jeffgeerling.com/blog/brief-history-ssh-and-remote-access Credits --- The vulnerability was discovered by Harry Sintonen / F-Secure Corporation. Timeline 2018.08.08 initial discovery of vulnerabilities #1 and #2 2018.08.09 reported vulnerabilities #1 and #2 to OpenSSH

[FD] MagniComp SysInfo Information Exposure [CVE-2018-7268]

2018-06-19 Thread Harry Sintonen
- 1. Unrelated earlier privilege escalation vulnerability CVE-2017-6516 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6516 Credits --- The vulnerability was discovered by Harry Sintonen / F-Secure Corporation. Timeline 2018.02.13 discovered the vulner

[FD] foilChat sign up email PIN confirmation bypass

2018-05-29 Thread Harry Sintonen
erable versions --- foilChat confirmed the issue fixed 2018-05-24. Credits --- The vulnerability was discovered by Harry Sintonen. Timeline 2018.05.10 discovered the vulnerability 2018.05.10 reported the vulnerability via CERT-FI that forwarded it to foilChat

[FD] GNU Wget Cookie Injection [CVE-2018-0494]

2018-05-07 Thread Harry Sintonen
Vulnerable versions --- The following GNU Wget versions are confirmed vulnerable: - 1.7 thru 1.19.4 Mitigation -- 1. Upgrade to GNU Wget 1.19.5 or later, or to appropriate security updated package in your distribution Credits --- The vulnerability was discov

[FD] aws-cfn-bootstrap local code execution as root [CVE-2017-9450]

2017-12-01 Thread Harry Sintonen
ble systems could be high. Recommendations to vendor - 1. In aws-cfn-bootstrap `cfn-hup` command set the `DaemonContext` umask to 077. 2. For existing installations, run `chmod -R go-rwx /var/lib/cfn-hup` as root. End user mitigation ------- 1. Upgrade aws

[FD] QNAP QTS multiple RCE vulnerabilities (CVE-2017-6361, CVE-2017-6360, CVE-2017-6359)

2017-04-06 Thread Harry Sintonen
he command injection vulnerabilities by performing proper input validation (whitelisting) and/or shell metacharacter escaping, or by utilizing execl family of functions. End user mitigation --- - Install the firmware update version 4.2.4 build 20170313 or later. OR - Restrict

[FD] QNAP QTS 4.2.x multiple vulnerabilities

2017-02-15 Thread Harry Sintonen
- - Install the latest firmware update, version 4.2.3 build 20170213 or later. - If you're worried about Scraping privacy issues use external firewall to block the QNAP device from accessing the following external sites: ajax.googleapis.com www.imdb.com akas.imdb.c

[FD] [CSS] POINTYFEATHER / tar extract pathname bypass (CVE-2016-6321) - patch update

2016-10-30 Thread Harry Sintonen
Update on the advisory: As pointed out by several people, the ERROR macro did't fail the operation in a desired way: Files were still being created by tar. In order to really stop tar from doing silly things, FATAL_ERROR macro needs to be used instead. The patch has now been updated accordingly.

[FD] [CSS] POINTYFEATHER / tar extract pathname bypass (CVE-2016-6321)

2016-10-26 Thread Harry Sintonen
t2'16 special vulnerability release - Vulnerability: POINTYFEATHER aka Tar extract pathname bypass Credits: Harry Sintonen / FSC1V Cyber Security Services Date: 2016-10-27 Impact: File overwrite in certain situa