Re: phpMyBible 0.5.1 Mutiple XSS

2012-04-23 Thread Lostmon
Hi,
This is a discontinued product from 2007
also we can do a simple patch to all variables here:

### Vulnerable code 
$book = $_REQUEST['book'];
$chapter = $_REQUEST['chapter'];
$version = $_REQUEST['version'];
$curl = $_SERVER['REQUEST_URI'];
$searchword = $_REQUEST['searchword'];
#

# Patch here 
$book = intval($_REQUEST['book']);
$chapter = intval($_REQUEST['chapter']);
$version = htmlspecialchars($_REQUEST['version']);
$curl = $_SERVER['REQUEST_URI'];
$searchword = htmlspecialchars($_REQUEST['searchword']);
##

Thnx For your time !!
-- 
atentamente:
Lostmon (lost...@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Google group: http://groups.google.com/group/lostmon
--
La curiosidad es lo que hace mover la mente


FYI: We're now paying up to $20,000 for web vulns in our services

2012-04-23 Thread Michal Zalewski
Hey,

Hopefully this won't offend the moderators:

http://googleonlinesecurity.blogspot.com/2012/04/spurring-more-vulnerability-research.html

I suspect I know how the debate will be shaped - and I think I can
offer a personal insight. I helped shape our vulnerability reward
program from the start (November 2010), and I was surprised to see
that simply having an honest, no-nonsense, and highly responsive
process like this... well, it works for a surprisingly high number of
skilled researchers, even if you start with relatively modest rewards.

This puts an interesting spin on the conundrum of the black / gray
market vulnerability trade: you can't realistically outcompete all
buyers of weaponized exploits, but you can make the issue a lot less
relevant. By having several orders of magnitude more people reporting
bugs through a "white hat" channel, you are probably making
"underground" vulnerabilities a lot harder to find, and fairly
short-lived.

Cheers,
/mz


WebCalendar <= 1.2.4 Two Security Vulnerabilities

2012-04-23 Thread n0b0d13s

 -
 WebCalendar <= 1.2.4 Two Security Vulnerabilities
 -
 
 author..: Egidio Romano aka EgiX
 mail: n0b0d13s[at]gmail[dot]com
 software link...: https://sourceforge.net/projects/webcalendar/


 [-] vulnerable code in /install/index.php (CVE-2012-1495)

 674.$y = getPostValue ( 'app_settings' );
 675.if ( ! empty ( $y ) ) {
 676.  $settings['single_user_login'] = getPostValue ( 
'form_single_user_login' );
 677.  $settings['readonly'] = getPostValue ( 'form_readonly' );
 ...
 724.  // Save settings to file now.
 725.if ( ! empty ( $x ) || ! empty ( $y ) ){
 726.  $fd = @fopen ( $file, 'w+b', false );
 727.  if ( empty ( $fd ) ) {
 728.if ( @file_exists ( $file ) ) {
 729.  $onloadDetailStr =
 730.translate ( 'Please change the file permissions of this file', 
true );
 731.} else {
 732.  $onloadDetailStr =
 733.translate ( 'Please change includes dir permission', true );
 734.}
 735.$onload = "alert('" . $errorFileWriteStr . $file. "\\n" .
 736.  $onloadDetailStr . ".');";
 737.  } else {
 738.if ( function_exists ( "date_default_timezone_set" ) )
 739.  date_default_timezone_set ( "America/New_York");
 740.fwrite ( $fd, " $v ) {
 743.  if ( $v != '' && $v != '' )
 744.  fwrite ( $fd, $k . ': ' . $v . "\r\n" );
 745.}
 
 Restricted access  to this script isn't  properly realized,  so an attacker 
might be able
 to  update  /includes/settings.php  with arbitrary  values  or  inject PHP 
code  into it.
 
 
 [-] vulnerable code to LFI in /pref.php (CVE-2012-1496)
  
 70.if ( ! empty ( $_POST ) && empty ( $error )) {
 71.  $my_theme = '';
 72.  $currenttab = getPostValue ( 'currenttab' );
 73.  save_pref ( $_POST, 'post' );
 74. 
 75.  if ( ! empty ( $my_theme ) ) {
 76.$theme = 'themes/'. $my_theme . '_pref.php';
 77.include_once $theme;
 78.save_pref ( $webcal_theme, 'theme' );
 79.  }
 
 Input passed through $_POST['pref_THEME'] isn't properly sanitized  before 
being assigned
 to $my_theme variable, this can be exploited to include arbitrary local files 
at line 77.
 Exploitation  of this  vulnerability requires  authentication and 
magic_quotes_gpc = off.
 
 
 [-] Disclosure timeline:
 
 [02/10/2011] - Vulnerabilities discovered
 [04/10/2011] - Vendor notified to 
http://sourceforge.net/support/tracker.php?aid=3418570
 [20/02/2012] - First vendor response
 [28/02/2012] - Vendor fix committed to CVS
 [29/02/2012] - Version 1.2.5 released
 [02/03/2012] - CVE numbers requested
 [02/03/2012] - Assigned CVE-2012-1495 and CVE-2012-1496
 [23/04/2012] - Public disclosure


AST-2012-006: Remote Crash Vulnerability in SIP Channel Driver

2012-04-23 Thread Asterisk Security Team
   Asterisk Project Security Advisory - AST-2012-006

  Product Asterisk
  Summary Remote Crash Vulnerability in SIP Channel Driver
 Nature of Advisory   Remote Crash
   Susceptibility Remote Authenticated Sessions   
  SeverityModerate
   Exploits Known No  
Reported On   April 16, 2012  
Reported By   Thomas Arimont  
 Posted OnApril 23, 2012  
  Last Updated On April 23, 2012  
  Advisory ContactMatt Jordan < mjordan AT digium DOT com >   
  CVE Name

Description  A remotely exploitable crash vulnerability exists in the 
 SIP channel driver if a SIP UPDATE request is processed  
 within a particular window of time. For this to occur, the   
 following must take place:   
  
 1. The setting 'trustrpid' must be set to True   
  
 2. An UPDATE request must be received after a call has been  
 terminated and the associated channel object has been
 destroyed, but before the SIP dialog associated with the 
 call has been destroyed. Receiving the UPDATE request
 before the call is terminated or after the SIP dialog
 associated with the call will not cause the crash
 vulnerability described here.
  
 3. The UPDATE request must be formatted with the 
 appropriate headers to reflect an Asterisk connected line
 update. The information in the headers must reflect a
 different Caller ID then what was previously associated  
 with the dialog. 
  
 When these conditions are true, Asterisk will attempt to 
 perform a connected line update with no associated channel,  
 and will crash.  

Resolution  Asterisk now ensures a channel exists before performing a 
connected line update, when that connected line update is 
initiated via a SIP UPDATE request.   
  
In Asterisk versions not containing the fix for this issue,   
setting the 'trustrpid' setting to False will prevent this
crash from occurring (default is False)   

   Affected Versions
 Product   Release Series  
  Asterisk Open Source 1.8.x   All versions   
  Asterisk Open Source  10.x   All versions   
Asterisk Business Edition  C.3.x   All versions   

  Corrected In
Product  Release  
  Asterisk Open Source   1.8.11.1, 10.3.1 
   Asterisk Business Edition C.3.7.4  

Patches 
   SVN URL  Revision  
   http://downloads.asterisk.org/pub/security/AST-2012-006-1.8.diff v1.8  
   http://downloads.asterisk.org/pub/security/AST-2012-006-10.diff  v.10  

   Links https://issues.asterisk.org/jira/browse/ASTERISK-19770   

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security  
  
This document may be superseded by later versions; if so, the latest  
version will be posted at 
http://downloads.digium.com/pub/security/AST-2012-006.pdf and 
http://downloads.digium.com/pub/security/AST-2012-006.html


AST-2012-005: Heap Buffer Overflow in Skinny Channel Driver

2012-04-23 Thread Asterisk Security Team
   Asterisk Project Security Advisory - AST-2012-005

  Product Asterisk
  Summary Heap Buffer Overflow in Skinny Channel Driver   
 Nature of Advisory   Exploitable Heap Buffer Overflow
   Susceptibility Remote Authenticated Sessions   
  SeverityMinor   
   Exploits Known No  
Reported On   March 26, 2012  
Reported By   Russell Bryant  
 Posted OnApril 23, 2012  
  Last Updated On April 23, 2012  
  Advisory ContactMatt Jordan < mjordan AT digium DOT com >   
  CVE Name

Description  In the Skinny channel driver, KEYPAD_BUTTON_MESSAGE events   
 are queued for processing in a buffer allocated on the   
 heap, where each DTMF value that is received is placed on
 the end of the buffer. Since the length of the buffer is 
 never checked, an attacker could send sufficient 
 KEYPAD_BUTTON_MESSAGE events such that the buffer is 
 overrun. 

Resolution  The length of the buffer is now checked before appending a
value to the end of the buffer.   

   Affected Versions
Product  Release Series  
 Asterisk Open Source   1.6.2.x  All Versions 
 Asterisk Open Source1.8.x   All Versions 
 Asterisk Open Source 10.x   All Versions 

  Corrected In
Product  Release  
  Asterisk Open Source  1.6.2.24, 1.8.11.1, 10.3.1

 Patches  
SVN URL   Revision 
   http://downloads.asterisk.org/pub/security/AST-2012-005-1.6.2.diff v1.6.2   
   http://downloads.asterisk.org/pub/security/AST-2012-005-1.8.diff   v1.8 
   http://downloads.asterisk.org/pub/security/AST-2012-005-10.diffv10  

   Links https://issues.asterisk.org/jira/browse/ASTERISK-19592   

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security  
  
This document may be superseded by later versions; if so, the latest  
version will be posted at 
http://downloads.digium.com/pub/security/AST-2012-005.pdf and 
http://downloads.digium.com/pub/security/AST-2012-005.html

Revision History
  Date  Editor Revisions Made 
04/16/2012 Matt Jordan   Initial Release  

   Asterisk Project Security Advisory - AST-2012-005
  Copyright (c) 2012 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
   original, unaltered form.



AST-2012-004: Asterisk Manager User Unauthorized Shell Access

2012-04-23 Thread Asterisk Security Team
   Asterisk Project Security Advisory - AST-2012-004

  Product Asterisk
  Summary Asterisk Manager User Unauthorized Shell Access 
 Nature of Advisory   Permission Escalation   
   Susceptibility Remote Authenticated Sessions   
  SeverityMinor   
   Exploits Known No  
Reported On   February 23, 2011   
Reported By   David Woolley   
 Posted OnApril 23, 2012  
  Last Updated On April 23, 2012  
  Advisory ContactJonathan Rose < jrose AT digium DOT com >   
  CVE Name

Description  A user of the Asterisk Manager Interface can bypass a
 security check and execute shell commands when they lack 
 permission to do so. Under normal conditions, a user should  
 only be able to run shell commands if that user has System   
 class authorization. Users could bypass this restriction by  
 using the MixMonitor application with the originate action   
 or by using either the GetVar or Status manager actions in   
 combination with the SHELL and EVAL functions. The patch 
 adds checks in each affected action to verify if a user has  
 System class authorization. If the user does not have those  
 authorizations, Asterisk rejects the action if it detects
 the use of any functions or applications that run system 
 commands.

Resolution  Asterisk now performs checks against manager commands that
cause these behaviors for each of the affected actions.   

   Affected Versions
 Product   Release Series  
  Asterisk Open Source1.6.2.x  All versions   
  Asterisk Open Source 1.8.x   All versions   
  Asterisk Open Source  10.x   All versions   
Asterisk Business Edition  C.3.x   All versions   

  Corrected In
  Product  Release
   Asterisk Open Source  1.6.2.24, 1.8.11.1, 10.3.1   
 Asterisk Business Edition C.3.7.4

 Patches  
SVN URL   Revision 
   http://downloads.asterisk.org/pub/security/AST-2012-004-1.6.2.diff v1.6.2   
   http://downloads.asterisk.org/pub/security/AST-2012-004-1.8.diff   v1.8 
   http://downloads.asterisk.org/pub/security/AST-2012-004-10.diffv10  

   Links https://issues.asterisk.org/jira/browse/ASTERISK-17465   

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security  
  
This document may be superseded by later versions; if so, the latest  
version will be posted at 
http://downloads.digium.com/pub/security/AST-2012-004.pdf and 
http://downloads.digium.com/pub/security/AST-2012-004.html

Revision History
  Date  Editor Revisions Made 
04/23/2012   Jonathan Rose Initial Release  


   Asterisk Project Security Advisory - AST-2012-004
  Copyright (c) 2012 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
   original, unaltered form.



ChurchCMS 0.0.1 'admin.php' Multiple SQLi

2012-04-23 Thread Thomas Richards
# Exploit Title: ChurchCMS 0.0.1 'admin.php' Multiple SQLi
# Date: 04/21/12
# Author: G13
# Twitter: @g13net
# Software Link: http://sourceforge.net/projects/churchcms/?source=directory
# Version: 0.0.1
# Category: webapps (php)
#

# Description #

ChurchCMS is the software to place on your church's website that is
easily managed, self-intuitive, yet expandable via our module library.
Included features are: announcements, calendar, prayer requests
manager, and help wanted manager.

# Vulnerability #

The admin.php page has multiple SQL injection vulnerabilities.  Both
the 'uname' and 'pass'  parameters are vulnerable to SQL Injection.

The vulnerability exists via the POST method.

# Exploit #

POST http://localhost/churchcms/admin.php?op=login HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:11.0)
Gecko/20100101 Firefox/11.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Proxy-Connection: keep-alive
Referer: http://localhost/churchcms/index.php
Cookie: PHPSESSID=eq342ldrgqt4i5fshe6q2kvj17
Content-Type: application/x-www-form-urlencoded
Content-length: 40
uname=[SQLi]&pass=[SQLi]

# Vendor Notification #

04/21/12 - Vendor notified

Per my disclosure policy, advisory is released.

http://www.g13net.com/vuln-disc.txt


.NET Framework EncoderParameter integer overflow vulnerability

2012-04-23 Thread Akita Software Security

.NET Framework EncoderParameter integer overflow vulnerability

Yorick Koster, September 2011


Abstract

An integer overflow vulnerability has been discovered in the
EncoderParameter class of the .NET Framework. Exploiting this
vulnerability results in an overflown integer that is used to allocate a
buffer on the heap. After the incorrect allocation, one or more
user-supplied buffers are copied in the new buffer, resulting in a
corruption of the heap.

By exploiting this vulnerability, it is possible for an application
running with Partial Trust permissions to to break from the CLR sandbox
and run arbitrary code with Full Trust permissions.


Affected versions

It has been verified that this vulnerability exists in the .NET
Framework versions 2.0, 3.0, 3.5 & 4. Earlier versions of the .NET
Framework may or may not be vulnerable as well as the affected class is
also available the .NET Framework versions 1.0 & 1.1.


See also

- MS12-025 [2]: Vulnerability in .NET Framework Could Allow Remote Code
Execution (2671605)
- KB2671605 [3] MS12-025: Vulnerabilities in the .NET Framework could
allow remote code execution: April 10, 2012
- SSD: [4] SecuriTeam Secure Disclosure program
- MS12-025 [5]: IKVM.NET Weblog


Fix

This issue was resolved with the release of MS12-025 [6]. It appears the
fix was part of a security push for System.Drawing.dll.


Introduction

The EncoderParameter class (System.Drawing.Imaging.EncoderParameter [7])
is used to pass a value, or an array of values, to an image encoder
(GDI+). An image encoder can be used to translate an Image or Bitmap
object to a particular file format, for example GIF, JPEG or PNG.

EncoderParameter is implemented in the System.Drawing.dll Assembly,
which is located in the Global Assembly Cache [8] (GAC). Consequently,
the Assembly is trusted by the .NET Framework and therefore this
Assembly will run with Full Trust permissions. In addition, the Assembly
is compiled with the AllowPartiallyTrustedCallers [9] attribute, which
allows it to be called from Assemblies running with Partial Trust
permissions.


Integer overflow

The EncoderParameter class contains various constructor methods. All of
these constructors allocate memory on the heap. The size of the
allocated buffer depends on the constructor's parameters. After
allocation, the values of these constructor parameters are copied into
the new buffer. For example the constructor EncoderParameter(Encoder,
Int64) accepts a 64-bit (8-byte) long value, thus 8 bytes are allocated
on the heap after which the value of the long parameter is copied into
this heap buffer. The heap buffer is freed by calling the Dispose()
method. This method is also called when the EncoderParameter object is
destroyed.

Some constructor methods accept one or more arrays. For these methods,
the number of allocated bytes is the size of one array member multiplied
by the number of members in the array. These methods do not check
whether the resulting integer value (used for heap allocation)
overflows. In some cases it is possible to trigger an integer overflow
resulting in the allocation of a buffer that is too small for the
supplied constructor parameters. Not all methods are exploitable as an
overly long array is required to trigger an integer overflow. The .NET
Framework limits the number of array members.

One constructor method (EncoderParameter(Encoder, Int32[], Int32[],
Int32[], Int32[])) appears to be very suitable for exploiting this
vulnerability. The implementation of this method is listed below.

public EncoderParameter(Encoder encoder,
int[] numerator1, int[] denominator1,
int[] numerator2, int[] denominator2)
{
this.parameterGuid = encoder.Guid;
if (numerator1.Length != denominator1.Length ||
numerator1.Length != denominator2.Length ||
denominator1.Length != denominator2.Length)
{
throw SafeNativeMethods.Gdip.StatusException(2);
   

HTC IQRD Android Permission Leakage (CVE-2012-2217)

2012-04-23 Thread VSR Advisories
 VSR Security Advisory
   http://www.vsecurity.com/

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Advisory Name: HTC IQRD Android Permission Leakage
 Release Date: 2012-04-20
  Application: IQRD on HTC Android Phones
   Author: Dan Rosenberg 
Vendor Status: Patch Released
CVE Candidate: CVE-2012-2217
Reference: http://www.vsecurity.com/resources/advisory/20120420-1/

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


Product Description
---
The IQRD service is HTC's implementation of a Carrier IQ porting layer on
several HTC Android phones.  Carrier IQ is a data collection framework that may
be deeply integrated into the Android application stack in order to provide
cell carriers with detailed metrics data on device and network activity [1].
To complete the integration of Carrier IQ on a specific device, phone
manufacturers provide a "porting layer" that allows the Carrier IQ service to
perform specific actions that may vary by device.


Vulnerability Details
-
On December 22th, VSR identified a vulnerability in IQRD.  The IQRD service
listens locally on a TCP socket bound to port 2479.  This socket is intended to
allow the Carrier IQ service to request device-specific functionality from
IQRD.  Unfortunately, there is no restriction or validation on which
applications may request services using this socket.  As a result, any
application with the android.permission.INTERNET permission may connect to this
socket and send specially crafted messages in order to perform potentially
malicious actions.

In particular, it is possible for malicious applications to:

1. Trigger UI popup messages

2. Generate tones

3. Send arbitrary outbound SMS messages that do not appear in a user's
   outbox, facilitating toll fraud

4. Retrieve a user's Network Access Identifier (NAI) and corresponding
   password, potentially allowing rogue devices to impersonate the user
   on a CDMA network


Versions Affected
-
The issue is confirmed to affect the HTC EVO 4G, HTC EVO Design 4G, EVO Shift
4G, HTC EVO 3D, HTC EVO View 4G, and HTC Hero on Sprint; and the HTC Vivid on
AT&T.


Vendor Response
---
The following timeline details HTC's response to the reported issue:

2011-12-22Vulnerability reported to HTC
2011-12-28HTC confirms receipt, replies that fix is planned for early 2012
2012-03-10VSR requests status update
2012-03-16HTC confirms fix has been published
2012-03-26HTC requests clarification on finding
2012-03-26VSR provides clarification on finding, requests confirmation on
  status of fix
2012-04-02HTC provides confirmation of fix, requests further clarification
2012-04-02VSR provides clarification on finding
2012-04-12VSR provides draft advisory to HTC
2012-04-13HTC provides corrections to advisory, requests disclosure date
2012-04-20Coordinated disclosure


Recommendation
--

HTC has issued a fix that will typically be provided as an OTA update by
affected cell carriers.  If the update has not automatically been installed, it
is possible to retrieve the update manually by navigating to Menu -> Settings
-> System Updates -> HTC Software Update -> Check Now.

The following software versions on Sprint are confirmed to resolve this issue:

HTC EVO 4G: 4.67.651.3
HTC EVO Design 4G:  2.12.651.5
HTC EVO Shift 4G:   2.77.651.3
HTC EVO 3D: 2.17.651.5
HTC EVO View 4G:2.23.651.1

The following software versions on AT&T are confirmed to resolve this issue:

HTC Vivid:  3.26.502.56


All affected devices except the HTC Hero have received an over-the-air update.
HTC and Sprint have declined to update the HTC Hero, citing its 2009 release,
minimal current usage, and lack of malicious applications in the Android
Marketplace exploiting this vulnerability.

Users should be aware that devices that no longer receive updates due to
switching carriers may remain vulnerable.


Common Vulnerabilities and Exposures (CVE) Information
--
The Common Vulnerabilities and Exposures (CVE) project has assigned the number
CVE-2012-2217 to this issue.  This is a candidate for inclusion in the CVE list
(http://cve.mitre.org), which standardizes names for security problems.


Acknowledgements

Thanks to HTC for their response and fix.


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

References:

1. Carrier IQ
   http://www.carrieriq.com


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

This advisory is distributed for educational purposes only with the sincere
hope that it will help promote public safety.  This advisory comes with
absolutely NO WARRANTY; not even the implied warranty of merchantabilit

[HITB-Announce] HITB Magazine Issue 008 (now with print edition!)

2012-04-23 Thread Hafez Kamal

The 8th issue of the HITB Quarterly Magazine is now available for download!

http://magazine.hitb.org/

This edition is a little bit 'lighter' than previous issues as the
editorial team is busy working on an extra special release for our 10th
year anniversary conference in October, HITBSecConf2012 - Malaysia.

http://conference.hitb.org/hitbsecconf2012kul/

For the first time ever though, we're making print editions of the
magazine available (courtesy of HP MagCloud) - A print edition of the
HITB Quarterly is a perfect addition for your coffee table or office
reception area and we'll be making past issues also available for print
over the next couple of weeks.

We're hoping that print sales will allow us to pay our authors and
contributors for their articles, so ordering a print copy is a way for
you to help support them! Putting together content for the magazine is
practically a full time job and it would be nice to offer authors some
form of compensation for the time and energy taken to produce the high
quality articles that you all enjoy.

Enjoy the issue and hopefully see you at #HITB2012AMS in May:
http://conference.hitb.org/hitbsecconf2012ams/

---
Hafez Kamal
HITB Crew
Hack in The Box (M) Sdn. Bhd.
Suite 26.3, Level 26, Menara IMC,
No. 8 Jalan Sultan Ismail,
50250 Kuala Lumpur,
Malaysia

Tel: +603-20394724
Fax: +603-20318359



XSS and Blind SQL Injection Vulnerabilities in ExponentCMS

2012-04-23 Thread Netsparker Advisories
Information

Name :  XSS and Blind SQL Injection Vulnerabilities in ExponentCMS
Software :  ExponentCMS 2.0.5 and possibly below.
Vendor Homepage :  http://www.exponentcms.org
Vulnerability Type :  Cross-Site Scripting and SQL Injection
Severity :  Critical
Researcher :  Onur Yılmaz
Advisory Reference :  NS-12-006

Description

Exponent is a website content management system (or CMS) that allows
site owners to easily create and manage dynamic websites without
necessarily directly coding web pages, or managing site navigation.

Details

Exponent CMS is affected by XSS and SQL Injection vulnerabilities in
version 2.0.5.

Example PoC urls are as follows :
http://example.com/index.php?section=(SELECT%201%20FROM%20(SELECT%20SLEEP(25))A)
http://example.com/index.php?action=showall_by_tags&tag=%27%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(1337)%3C/script%3E&controller=news&src=@random4e5433b85bb1f
http://example.com/index.php?controller=expTag&action=show&title=changes&src=%27%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(1337)%3C/script%3E

You can read the full article about Cross-Site Scripting and SQL
Injection vulnerabilities from here :
http://www.mavitunasecurity.com/crosssite-scripting-xss/
http://www.mavitunasecurity.com/sql-injection/

Solution

The vendor fixed this vulnerability in the new version. Please see the
references.

Advisory Timeline

12/03/2012 - First contact: Sent the vulnerability details
20/03/2012 - Vulnerability Fixed in latest version
25/04/2012 - Vulnerability Released

Credits

It has been discovered on testing of Netsparker, Web Application
Security Scanner - http://www.mavitunasecurity.com/netsparker/.

References

Vendor Url / Patch :
http://exponentcms.org/news/-happy-hyperbole-v2-0-6-is-in-full-bloom
MSL Advisory Link :
http://www.mavitunasecurity.com/blog/xss-and-blind-sql-injection-vulnerabilities-in-exponentcms/
Netsparker Advisories : http://www.mavitunasecurity.com/netsparker-advisories/

About Netsparker

Netsparker® can find and report security issues such as SQL Injection
and Cross-site Scripting (XSS) in all web applications regardless of
the platform and the technology they are built on. Netsparker's unique
detection and exploitation techniques allows it to be dead accurate in
reporting hence it's the first and the only False Positive Free web
application security scanner.

-- 
Netsparker Advisories, 
Homepage, http://www.mavitunasecurity.com/netsparker-advisories/


[Spam] Chengdu Bureau of Commerce - SQL Injection Vulnerability

2012-04-23 Thread Research
Title:
==
Chengdu Bureau of Commerce - SQL Injection Vulnerability


Date:
=
2012-04-23


References:
===
http://www.vulnerability-lab.com/get_content.php?id=312


VL-ID:
=
312


Introduction:
=
May 20, by my bureau composed of 10 members, participated in by the Chinese 
Cycling Association,
Chengdu Sports Bureau, Chong City People s Government s  second bike fans in 
Chengdu, China Fitness
Festival  Second station (Chong City) match. Team members promote unity and 
cooperation, work hard,
beyond the spirit of self, fully demonstrating the business outlook of the 
bureau team has achieved
good results ever, won the Chengdu-class team of 28 community agencies large 
group of 5 km Team
finished sixth. 

(Copy of the Vendor Homepage: http://www.cdmbc.gov.cn/detail.php?tid=236657 )


Abstract:
=
The Vulnerability Laboratory Research Team discovered a critical SQL Injection 
Vulnerability in the Chengdu Bureau of Commerce website.


Report-Timeline:

2011-11-08: Vendor Notification
2011-11-09: Vendor Response/Feedback
2012-04-19: Vendor Fix/Patch
2011-04-20: Public or Non-Public Disclosure


Status:

Published


Exploitation-Technique:
===
Remote


Severity:
=
Critical


Details:

A SQL Injection vulnerability is detected on the Chinese Academy Of Governance 
website . The vulnerability is located on 
the list.php file when processing to  request via unsantized cid value 
parameter. Remote 
Attackers & privileged user 
accounts can inject/execute own sql commands to compromise the affected 
application dbms. 

Vulnerable Module(s):
[+] list.php - 
CID


Proof of Concept:
=
The SQL Injection vulnerability can be exploited by remote attackers without 
user inter action. For demonstration or reproduce ...

Site:   www.cdmbc.gov.cn/ist.php?cid=
Path:   /ist.php?cid=
File:   list.php?cid=
Value:  ?cid=[SQL Injection]


Solution:
=
CLOSED BY COORDINATION OF CHINA NATIONAL VULNERABILITY DATABASE FOR INFORMATION 
SECURITY (CNNVD PARTNERS).


Risk:
=
The security risk of the remote SQL Injection vulnerability is estimated as 
critical.


Credits:

Vulnerability Research Laboratory - Chokri Ben Achor 
(meis...@vulnerability-lab.com) &  Benjamin Kunz mejr 
(rem...@vulnerability-lab.com)


Disclaimer:
===
The information provided in this advisory is provided as it is without any 
warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and 
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, 
indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have 
been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential 
or incidental damages so the foregoing limitation 
may not apply. Any modified copy or reproduction, including partially usages, 
of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified 
form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab or its suppliers.

Copyright © 2012 
Vulnerability-Lab




-- 
VULNERABILITY RESEARCH LABORATORY TEAM
Website: www.vulnerability-lab.com
Mail: resea...@vulnerability-lab.com




PSFTP v.1.8 Build 921 - Null Pointer (DoS) Vulnerability

2012-04-23 Thread Research
Title:
==
PSFTP v.1.8 Build 921 - Null Pointer (DoS) Vulnerability


Date:
=
2012-04-23


References:
===
http://www.vulnerability-lab.com/get_content.php?id=523


VL-ID:
=
523


Introduction:
=
PSFtp ist eine benutzerfreundliche, ergonomische, kompakte und zuverlässige FTP 
Client Software mit einem großen 
Funktionsumfang. Was ist ein FTP Client? Das ist ein Programm (einige nennen es 
auch einfach ein FTP Programm), welches 
mit einem Dateimanager vergleichbar ist. Nur greift es nicht etwa auf eine 
andere Partition oder ein anderes Laufwerk zu, 
sondern auf einen Rechner im Internet - auf einen FTP Server. Ein FTP Client 
eignet sich bestens für die Homepage-Pflege 
(natürlich nicht nur dafür). Sie können z.B. Ihre Homepage-Dateien leicht auf 
einen FTP Server hochladen (engl. Upload) 
oder auch irgendwelche Dateien herunterladen (engl. Download). 

(Copy of the Vendor Homepage: http://www.psftp.de/index.php )


Abstract:
=
The Vulnerability Laboratory Researcher Team discovered Null Pointer 
Dereference (DoS) Vulnerability in PSFTP v.1.8 Build 921.


Report-Timeline:

2012-04-23: Public or Non-Public Disclosure


Status:

Published


Exploitation-Technique:
===
Local


Severity:
=
Medium


Details:

A Null Pointer Dereference (DoS) Vulnerability is detected in PSFTP v.1.8 Build 
921. The vulnerability allows an 
local privileged user to crash down the service with a persistent 
effect(stable). The bug is located when processing 
to load large unicode keys over the license management box of the psftp client 
software. The inserted unicode or numeric 
string got saved on the PSFTP_Key.dat which results in the stable null pointer 
dereference crash after the software restart.
Successful exploitation results in a stable (bex exception) application 
(StackHash_e98d) crash.

Vulnerable Module(s):
[+] PSFTP_Key


--- Windows Error Reports ---
Version=1
EventType=BEX
EventTime=129792568365093863
ReportType=2
Consent=1
ReportIdentifier=79865f7e-899a-11e1-98b1-a88e8292e5db
IntegratorReportIdentifier=79865f7d-899a-11e1-98b1-a88e8292e5db
WOW64=1
Response.type=4
Sig[0].Name=Anwendungsname
Sig[0].Value=PSFtp.exe
Sig[1].Name=Anwendungsversion
Sig[1].Value=1.8.1.921
Sig[2].Name=Anwendungszeitstempel
Sig[2].Value=2a425e19
Sig[3].Name=Fehlermodulname
Sig[3].Value=StackHash_e98d
Sig[4].Name=Fehlermodulversion
Sig[4].Value=0.0.0.0
Sig[5].Name=Fehlermodulzeitstempel
Sig[5].Value=
Sig[6].Name=Ausnahmeoffset
Sig[6].Value=
Sig[7].Name=Ausnahmecode
Sig[7].Value=c005
Sig[8].Name=Ausnahmedaten
Sig[8].Value=0008
DynamicSig[1].Name=Betriebsystemversion
DynamicSig[1].Value=6.1.7601.2.1.0.768.3
DynamicSig[2].Name=Gebietsschema-ID
DynamicSig[2].Value=1031
DynamicSig[22].Name=Zusatzinformation 1
DynamicSig[22].Value=e98d
DynamicSig[23].Name=Zusatzinformation 2
DynamicSig[23].Value=e98dfca8bcf81bc1740adb135579ad53
DynamicSig[24].Name=Zusatzinformation 3
DynamicSig[24].Value=6eab
DynamicSig[25].Name=Zusatzinformation 4
DynamicSig[25].Value=6eabdd9e0dc94904be3b39a1c0583635
UI[2]=C:Program Files (x86)PSFtpPSFtp.exe
UI[3]=PSFtp - FTP FTPS SFTP Client funktioniert nicht mehr
UI[4]=Windows kann online nach einer Lösung für das Problem suchen.
UI[5]=Online nach einer Lösung suchen und das Programm schließen
UI[6]=Später online nach einer Lösung suchen und das Programm schließen
UI[7]=Programm schließen
LoadedModule[0]=C:Program Files (x86)PSFtpPSFtp.exe
LoadedModule[1]=C:WindowsSysWOW64ntdll.dll
LoadedModule[2]=C:Windowssyswow64kernel32.dll
...   ...   ...
LoadedModule[30]=C:Windowssystem32wsock32.dll
LoadedModule[31]=C:Windowssyswow64WS2_32.dll
LoadedModule[32]=C:Windowssyswow64NSI.dll
LoadedModule[33]=C:Windowssystem32hhctrl.ocx
LoadedModule[34]=C:Windowssystem32IMM32.DLL
LoadedModule[35]=C:Windowssyswow64MSCTF.dll
LoadedModule[36]=C:Windowssystem32uxtheme.dll
FriendlyEventName=Nicht mehr funktionsfähig
ConsentKey=BEX
AppName=PSFtp - FTP FTPS SFTP Client
AppPath=C:Program Files (x86)PSFtpPSFtp.exe




Picture(s):
../1.png
../2.png


Risk:
=
The security risk of the null pointer (dos) vulnerability is estimated as 
medium(-).


Credits:

Vulnerability Laboratory [Research Team]  -N/A  Anonymous


Disclaimer:
===
The information provided in this advisory is provided as it is without any 
warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and 
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, 
indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or it

[Suspected Spam] Havalite CMS v1.0.4 - Multiple Web Vulnerabilities

2012-04-23 Thread Research
Title:
==
Havalite CMS v1.0.4 - Multiple Web Vulnerabilities


Date:
=
2012-04-23


References:
===
http://www.vulnerability-lab.com/get_content.php?id=520


VL-ID:
=
520


Introduction:
=
Havalite, a lightweight, open source CMS, based on php and SQLite. It\\\'s 
licensed under the GNU General Public License.

- A Mobile Detector to switch in Mobile mode
- Simple 1 step wizard installation
- Text, Images and swf files all saved as data in Sqlite Database
- Two different image sizes: Original and Thumnail
- Backup for the whole system including images in only one Sqlite file. SqLite3 
and above allows storing Blobs and a better Utf-8 performance
- Export database to any Server without changing a single line or database 
structure.
- A lite weight and clear interface
- Many Interface languages done on the fly with our language Creator Tool
- FCKEditor a great WYSIWYG Text-Editor
- integration of third-party Plugins, specially jQuery, with the ability of 
plugin configuration
- plenty of useful functions for Theme creation + Theme Preview, and Plugins 
Creation
- RSS Feeds for Posts, Categories and Comments

(Copy of the Vendor Homepage: http://havalite.com )



Abstract:
=
The Vulnerability Laboratory Researcher Team discovered multiple Web 
Vulnerabilities in Havalite CMS v1.0.4.


Report-Timeline:

2012-04-23: Public or Non-Public Disclosure


Status:

Published


Exploitation-Technique:
===
Remote


Severity:
=
Medium


Details:

1.1
Multiple persistent input validation vulnerabilities are detected in Havalite 
v1.0.4 Content Management System.
The bugs allow remote attackers to implement/inject malicious script code on 
the application side (persistent).
Successful exploitation of the vulnerability can lead to session hijacking 
(manager/admin) or stable (persistent) 
context manipulation. Exploitation requires low user inter action because the 
admin needs to watch the user list.
The user includes his scriptcode as profile name and the code is getting 
executed on the administrator section 
persistent.


Vulnerable Module(s):
[+] findReplace - Input/Output Listing
[+] Username Profile Input & Username Login or 
Input Message Miscellaneous [postAuthor]

Picture(s):
../1.png
../2.png


1.2
Multiple non persistent cross site scripting vulnerabilities are detected in 
Havalite v1.0.4 Content Management System.
The vulnerability allows remote attackers to hijack website customer, moderator 
or admin sessions with high required 
user inter action or local low privileged user account. Successful exploitation 
can result in account steal, phishing 
& client-side content request manipulation.


Vulnerable Module(s):
[+] postID
[+] userID
[+] linkID

Picture(s):
../3.png
../4.png


Proof of Concept:
=
1.1
The persistent input validation vulnerabilities can be exploited by remote 
attacker with low or medium required 
user inter action. For demonstration or reproduce ...

Review: findReplace - Replace


Find:


Replace:



Find only
Find and Replace


http://127.0.0.1:8080/havalite/findReplace.php


Review: Login Username Form & Edit Article Module


Username



URL: http://127.0.0.1:8080/havalite/hava_login.php

... or via miscellaneous module postAuthor

 
Date: 

URL: http://127.0.0.1:8080/havalite/hava_post.php?postId=1


1.2
The client side cross site scripting vulnerabilities can be exploited by remote 
attacker with medium or high required 
user inter action. For demonstration or reproduce ...

PoC:
http://127.0.0.1:8080/havalite/hava_post.php?postId=%22%3E%3Ciframe%20src=a%20onload=alert%28%22VL%22%29%20%3C
http://127.0.0.1:8080/havalite/hava_user.php?userId=>"http://www.vulnerability-lab.com>
http://127.0.0.1:8080/havalite/hava_link.php?linkId=1%22%3E%3Ciframe%20src=a%20onload=alert%28%22VL%22%29%20%3C


Risk:
=
1.1
The security risk of the persistent input validation vulnerabilities are 
estimated as medium(+).

1.2
The security risk of the client side cross site scripting vulnerabilities are 
estimated as low(+).


Credits:

Vulnerability Laboratory [Research Team]   -Benjamin Kunz Mejri (Rem0ve)


Disclaimer:
===
The information provided in this advisory is provided as it is without any 
warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and 
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, 
indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have 

[Suspected Spam] IPhone TreasonSMS - HTML Inject & File Include Vulnerability

2012-04-23 Thread Research
Title:
==
IPhone TreasonSMS - HTML Inject & File Include Vulnerability


Date:
=
2012-04-23


References:
===
http://www.vulnerability-lab.com/get_content.php?id=154


VL-ID:
=
154


Introduction:
=
treasonSMS allows you to send SMS from your desktop computer. It turns your 
iPhone into a SMS webserver, so you can send 
sms and reply to SMS from your computer over wifi. Confirmed working with FF 
3.5, Safari and IE8.

(Copy of the Vendor Homepage: http://code.google.com/p/treasonsms/)


Abstract:
=
Vulnerability-Lab Team discovered multiple remote Web Vulnerabilities on 
treasonSMS Webserver for IPhone.


Report-Timeline:

2011-04-23: Public or Non-Public Disclosure


Status:

Published


Exploitation-Technique:
===
Remote


Severity:
=
High


Details:

A HTML Inject & a File Include vulnerabilit is detected on TreasonSMS IPhone 
application. The vulnerability allows an 
remote attacker to include malicious persistent script codes on 
application-side of the iphone. This possible way allows the
attacker also to inject for example webshell scripts to get control of the 
affected application folder. When the IPhone is 
jailbreaked the vulnerability exploitation can also result full controll of the 
affected IPhone. The Bug is located in the 
input fields of the Message Sending & Message Output.  An attacker can scan the 
victim on walkthrough because the ip 
of the webserver makes the treasonSMS available to anybody without password.
To exploit somebody on a walkthourgh its only required to scan for the stable 
ip via wlan and access the panel for exploitation.

Vulnerable Module(s):
[+] Send Messages, Kontakte & List Messages

Affected Version(s):
[+] treasonSMS-1.0.8-src 
[+] treasonSMS-1.0.8-deb

Picture(s):
../1.jpg
../treasonSMS-fileload_malware.png
../treasonSMS-mozilla_exploitation.png
../treasonSMS-Safari_exploitation1.png
../treasonSMS-Safari_exploitation2.jpg


Proof of Concept:
=
The vulnerability can be exploited by remote attackers. For demonstration or 
reproduce ...

2010-12-28 
18:49:22
Wir sind schon los, zuspatkommen macht keinen guten 
Eindruck.

2011-01-31 17:48:05+49 176 562533492011-02-11 
23:16:15Bin jetzt mit dem Minicar unterwegs zum MT..sonst wird das so 
spät.​2011-02-13 
00:50:57>"http://www.global-evolution.info"; height="600" width="600">2011-02-13 
00:52:34
>"<<== INCLUDE SCRIPTCODE;Webshell+SAFARI 
EXPLOIT HERE!><
div class='msgBottom'>&
lt;/span>​


Risk:
=
The security risk of the  web vulnerabilities are estimated as high(+).


Credits:

Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (Rem0ve)


Disclaimer:
===
The information provided in this advisory is provided as it is without any 
warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and 
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, 
indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have 
been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential 
or incidental damages so the foregoing limitation 
may not apply. Any modified copy or reproduction, including partially usages, 
of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified 
form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab or its suppliers.

Copyright © 2011 
Vulnerability-Lab




-- 
VULNERABILITY RESEARCH LABORATORY TEAM
Website: www.vulnerability-lab.com
Mail: resea...@vulnerability-lab.com




phpMyBible 0.5.1 Mutiple XSS

2012-04-23 Thread Thomas Richards
# Exploit Title: phpMyBible 0.5.1 Mutiple XSS
# Date: 04/15/12
# Author: G13
# Twitter: @g13net
# Software http://sourceforge.net/projects/phpmybible/?source=directory
# Version: 0.5.1
# Category: webapps (php)
#

# Description #

phpMyBible is an online collaborative project to make an e-book of the
Holy Bible in as various language as possible. phpMyBible is designed
to be flexible to all readers while maintaining the authenticity and
originality of the Holy Bible scripture.

# Vulnerability #

phpMyBible has multiple XSS vulnerabilities.

When reading a section of the Bible; both the 'version' and 'chapter'
variables are prone to reflective XSS.

# Exploit #

http://localhost/index.php?book=1&version=[XSS]&chapter=[XSS]

# Vendor Notification #

04/15/12 - Vendor Notified
04/22/12 - No response, disclos


[ MDVSA-2012:063 ] libreoffice

2012-04-23 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2012:063
 http://www.mandriva.com/security/
 ___

 Package : libreoffice
 Date: April 21, 2012
 Affected: 2011.
 ___

 Problem Description:

 An XML External Entity expansion flaw was found in the way Raptor
 processed RDF files. If an application linked against Raptor were to
 open a specially-crafted RDF file, it could possibly allow a remote
 attacker to obtain a copy of an arbitrary local file that the user
 running the application had access to. A bug in the way Raptor handled
 external entities could cause that application to crash or, possibly,
 execute arbitrary code with the privileges of the user running the
 application (CVE-2012-0037).
 
 libreoffice for Mandriva Linux 2011 has been upgraded to the 3.4.6
 version which is not vulnerable to this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0037
 http://www.libreoffice.org/advisories/CVE-2012-0037/
 ___

 Updated Packages:

 Mandriva Linux 2011:
 3c1d3a34fa0b2119565ad33a1d3db6f7  
2011/i586/libreoffice-3.4.6-0.1-mdv2011.0.i586.rpm
 4d48acecd9a8c48e604c564a09d44e25  
2011/i586/libreoffice-base-3.4.6-0.1-mdv2011.0.i586.rpm
 09342e435c0caba3560b3550d29682d1  
2011/i586/libreoffice-calc-3.4.6-0.1-mdv2011.0.i586.rpm
 98072acc0fbd26e8e65df016a0d21ecc  
2011/i586/libreoffice-common-3.4.6-0.1-mdv2011.0.i586.rpm
 9432e092e49094717d73c1a73783d13f  
2011/i586/libreoffice-core-3.4.6-0.1-mdv2011.0.i586.rpm
 7763ce9ccf098fa8a64cf09f38be4e72  
2011/i586/libreoffice-devel-3.4.6-0.1-mdv2011.0.i586.rpm
 1b935fb9f5937fb022f504ca000e5bae  
2011/i586/libreoffice-devel-doc-3.4.6-0.1-mdv2011.0.i586.rpm
 f1e8f36309d01cc586643a0eb6628c90  
2011/i586/libreoffice-draw-3.4.6-0.1-mdv2011.0.i586.rpm
 c86adb9e1dd7142022c81ed9a29651a4  
2011/i586/libreoffice-filter-binfilter-3.4.6-0.1-mdv2011.0.i586.rpm
 ab43be2ac5fb7b7ff6be957e2173787b  
2011/i586/libreoffice-gnome-3.4.6-0.1-mdv2011.0.i586.rpm
 8de46ee46d1b0fb09d31ea90b2b9e70b  
2011/i586/libreoffice-help-bg-3.4.6-0.1-mdv2011.0.i586.rpm
 c9049dc23a5d6f9eb15f8d14b317e0c8  
2011/i586/libreoffice-help-bn-3.4.6-0.1-mdv2011.0.i586.rpm
 ed44c74e78bc841adf476d42684d4937  
2011/i586/libreoffice-help-bs-3.4.6-0.1-mdv2011.0.i586.rpm
 4fb159f724337dc14b9b4e045c6846ca  
2011/i586/libreoffice-help-ca-3.4.6-0.1-mdv2011.0.i586.rpm
 793bfe18a6d491c4b7d10e3b61188b12  
2011/i586/libreoffice-help-cs-3.4.6-0.1-mdv2011.0.i586.rpm
 aa5616fb2939e8a491c70df7d6fb5978  
2011/i586/libreoffice-help-da-3.4.6-0.1-mdv2011.0.i586.rpm
 fcbffc2ab729e991f919f978928bc53a  
2011/i586/libreoffice-help-de-3.4.6-0.1-mdv2011.0.i586.rpm
 ae24a09858a80149f06003e53401f80b  
2011/i586/libreoffice-help-dz-3.4.6-0.1-mdv2011.0.i586.rpm
 043650f76857e731e0def744f63afeba  
2011/i586/libreoffice-help-el-3.4.6-0.1-mdv2011.0.i586.rpm
 98825157e1092453c775526a93dfe91b  
2011/i586/libreoffice-help-en_GB-3.4.6-0.1-mdv2011.0.i586.rpm
 378bfceaf174a0061e3a6a3a7bcc9d99  
2011/i586/libreoffice-help-en_US-3.4.6-0.1-mdv2011.0.i586.rpm
 9bd13c1b67b8f6f27b0696af8bddf554  
2011/i586/libreoffice-help-es-3.4.6-0.1-mdv2011.0.i586.rpm
 5a309d36b141f8e1d45e2d2b0d05793b  
2011/i586/libreoffice-help-et-3.4.6-0.1-mdv2011.0.i586.rpm
 dd66752313a16aea02278e6963747927  
2011/i586/libreoffice-help-eu-3.4.6-0.1-mdv2011.0.i586.rpm
 9afb3953e0cb6b84a8d5b21814608d0f  
2011/i586/libreoffice-help-fi-3.4.6-0.1-mdv2011.0.i586.rpm
 877196cd61cb0958e3eb4a6bcaa07201  
2011/i586/libreoffice-help-fr-3.4.6-0.1-mdv2011.0.i586.rpm
 e70c2148fd4ecf964a8d23ebd46e8704  
2011/i586/libreoffice-help-gl-3.4.6-0.1-mdv2011.0.i586.rpm
 7505fb9d5a7429d08f0c0a7ee23b0d91  
2011/i586/libreoffice-help-gu-3.4.6-0.1-mdv2011.0.i586.rpm
 369d8284334329b6bdec526c6f7ffbe0  
2011/i586/libreoffice-help-he-3.4.6-0.1-mdv2011.0.i586.rpm
 0324fabf1dee204930bb706ef8cb2e36  
2011/i586/libreoffice-help-hi-3.4.6-0.1-mdv2011.0.i586.rpm
 a6a035e9661f0cc320c5909356b64643  
2011/i586/libreoffice-help-hr-3.4.6-0.1-mdv2011.0.i586.rpm
 8b67c9660bc64ce92f5cf326462155af  
2011/i586/libreoffice-help-hu-3.4.6-0.1-mdv2011.0.i586.rpm
 42a7f91f75a03e212a95c391bec29bcd  
2011/i586/libreoffice-help-it-3.4.6-0.1-mdv2011.0.i586.rpm
 9c27a1d181c74849aa5f60bb2eac340a  
2011/i586/libreoffice-help-ja-3.4.6-0.1-mdv2011.0.i586.rpm
 4a3af34db222eadad41a13258e4f9f30  
2011/i586/libreoffice-help-ko-3.4.6-0.1-mdv2011.0.i586.rpm
 e53d0709d364705ec8f1a52c712c3432  
2011/i586/libreoffice-help-mk-3.4.6-0.1-mdv2011.0.i586.rpm
 c75c7da84e52e1883c9db045304cfe5b  
2011/i586/libreoffice-help-nb-3.4.6-0.1-mdv2011.0.i586.rpm
 c5af701e7bf6b5af75e1aea8dfb44651  
2011/i586/libreoffice-help-nl-3.4.6-0.

[ MDVSA-2012:062 ] openoffice.org

2012-04-23 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2012:062
 http://www.mandriva.com/security/
 ___

 Package : openoffice.org
 Date: April 21, 2012
 Affected: Enterprise Server 5.0
 ___

 Problem Description:

 An XML External Entity expansion flaw was found in the way Raptor
 processed RDF files. If an application linked against Raptor were to
 open a specially-crafted RDF file, it could possibly allow a remote
 attacker to obtain a copy of an arbitrary local file that the user
 running the application had access to. A bug in the way Raptor handled
 external entities could cause that application to crash or, possibly,
 execute arbitrary code with the privileges of the user running the
 application (CVE-2012-0037).
 
 The updated packages have been patched to correct this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0037
 http://www.libreoffice.org/advisories/CVE-2012-0037/
 ___

 Updated Packages:

 Mandriva Enterprise Server 5:
 f7d998d9bc2a5c3567fe4d4ff2da1ce8  
mes5/i586/openoffice.org-3.1.1-0.8mdvmes5.2.i586.rpm
 0f71b5572e78b3ee2514e651b1d20f3f  
mes5/i586/openoffice.org-base-3.1.1-0.8mdvmes5.2.i586.rpm
 9c42501d01127a42a4392866e864247c  
mes5/i586/openoffice.org-calc-3.1.1-0.8mdvmes5.2.i586.rpm
 e2359307684298f3541d86eec86c44d5  
mes5/i586/openoffice.org-common-3.1.1-0.8mdvmes5.2.i586.rpm
 b0dc16d73060970c012e23280c7f0626  
mes5/i586/openoffice.org-core-3.1.1-0.8mdvmes5.2.i586.rpm
 80a1c3ccfca249a352a58eb4e8416bc9  
mes5/i586/openoffice.org-devel-3.1.1-0.8mdvmes5.2.i586.rpm
 c5f5ecc95c78f15683c04b1dc7393906  
mes5/i586/openoffice.org-devel-doc-3.1.1-0.8mdvmes5.2.i586.rpm
 b151f537eff5fefeb79fee66959e0a68  
mes5/i586/openoffice.org-draw-3.1.1-0.8mdvmes5.2.i586.rpm
 5d0b7ff0ed0d90b5343f764943d4cd33  
mes5/i586/openoffice.org-filter-binfilter-3.1.1-0.8mdvmes5.2.i586.rpm
 6c2341254edf0088fa539f3a9ebd539b  
mes5/i586/openoffice.org-gnome-3.1.1-0.8mdvmes5.2.i586.rpm
 5f98111a35ba725e900b45deed344a79  
mes5/i586/openoffice.org-help-af-3.1.1-0.8mdvmes5.2.i586.rpm
 42a3a6f7f93dab18ab801eed0db55fa4  
mes5/i586/openoffice.org-help-ar-3.1.1-0.8mdvmes5.2.i586.rpm
 d8602c456e44d8584fe732e677dafe8d  
mes5/i586/openoffice.org-help-bg-3.1.1-0.8mdvmes5.2.i586.rpm
 5f7d57ba2a12d986c4b0b36603547dd6  
mes5/i586/openoffice.org-help-br-3.1.1-0.8mdvmes5.2.i586.rpm
 25b9e7700345e57994c528c9c0a6d5e8  
mes5/i586/openoffice.org-help-bs-3.1.1-0.8mdvmes5.2.i586.rpm
 db7270fcfe6ec5719f238018a4097fe4  
mes5/i586/openoffice.org-help-ca-3.1.1-0.8mdvmes5.2.i586.rpm
 9aa901dce255e830d24acfc7f3bb2504  
mes5/i586/openoffice.org-help-cs-3.1.1-0.8mdvmes5.2.i586.rpm
 ddd464caeb9114d5cc87b30ed78849fa  
mes5/i586/openoffice.org-help-cy-3.1.1-0.8mdvmes5.2.i586.rpm
 607d9503c253ad788e4edc052a97c1d3  
mes5/i586/openoffice.org-help-da-3.1.1-0.8mdvmes5.2.i586.rpm
 63a9a2d3e1abce9cb6a62f9aacef9790  
mes5/i586/openoffice.org-help-de-3.1.1-0.8mdvmes5.2.i586.rpm
 5977e226baad51dc0865979b71216f2f  
mes5/i586/openoffice.org-help-el-3.1.1-0.8mdvmes5.2.i586.rpm
 b2c92a0a105e459380a7590641af0e97  
mes5/i586/openoffice.org-help-en_GB-3.1.1-0.8mdvmes5.2.i586.rpm
 a75d6499c9037e6d68166b5899f5d834  
mes5/i586/openoffice.org-help-en_US-3.1.1-0.8mdvmes5.2.i586.rpm
 9a8d09530aabae91701c0e44cf3dfb53  
mes5/i586/openoffice.org-help-es-3.1.1-0.8mdvmes5.2.i586.rpm
 53a497a727dd697c97b2bd1de1560490  
mes5/i586/openoffice.org-help-et-3.1.1-0.8mdvmes5.2.i586.rpm
 f1544637c2d78d6c3ffdd92fe3d3509c  
mes5/i586/openoffice.org-help-eu-3.1.1-0.8mdvmes5.2.i586.rpm
 56f3dc905e28ae1e985d745a3fed9e30  
mes5/i586/openoffice.org-help-fi-3.1.1-0.8mdvmes5.2.i586.rpm
 2da37ed62273a2f31f638c23d8cb807d  
mes5/i586/openoffice.org-help-fr-3.1.1-0.8mdvmes5.2.i586.rpm
 9b1c72e78a7d8462458931f8cb8c5ac7  
mes5/i586/openoffice.org-help-he-3.1.1-0.8mdvmes5.2.i586.rpm
 c10b77405ca870a937d8d3a9d14f5969  
mes5/i586/openoffice.org-help-hi-3.1.1-0.8mdvmes5.2.i586.rpm
 2dec72546ad823737bf029e620bc3aee  
mes5/i586/openoffice.org-help-hu-3.1.1-0.8mdvmes5.2.i586.rpm
 3a78beb604ae99b470f1aaa56bebad47  
mes5/i586/openoffice.org-help-it-3.1.1-0.8mdvmes5.2.i586.rpm
 b45a825b209da74b6ca365bb843090e2  
mes5/i586/openoffice.org-help-ja-3.1.1-0.8mdvmes5.2.i586.rpm
 9f8da1b687594fa154654fe3177a1d4a  
mes5/i586/openoffice.org-help-ko-3.1.1-0.8mdvmes5.2.i586.rpm
 d59850f271025772d30972b338905f7f  
mes5/i586/openoffice.org-help-mk-3.1.1-0.8mdvmes5.2.i586.rpm
 8d937adc184b79910961af4b04cf4031  
mes5/i586/openoffice.org-help-nb-3.1.1-0.8mdvmes5.2.i586.rpm
 abc3aabfc0cf712bf9c5ad2494bc7156  
mes5/i586/openoffice.org-help-nl-3.1.1-0.8mdvmes5.2.i586.rpm
 205564d296c78b1b177517bf

[ MDVSA-2012:061 ] raptor

2012-04-23 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2012:061
 http://www.mandriva.com/security/
 ___

 Package : raptor
 Date: April 21, 2012
 Affected: 2010.1, 2011., Enterprise Server 5.0
 ___

 Problem Description:

 An XML External Entity expansion flaw was found in the way Raptor
 processed RDF files. If an application linked against Raptor were to
 open a specially-crafted RDF file, it could possibly allow a remote
 attacker to obtain a copy of an arbitrary local file that the user
 running the application had access to. A bug in the way Raptor handled
 external entities could cause that application to crash or, possibly,
 execute arbitrary code with the privileges of the user running the
 application (CVE-2012-0037).
 
 The updated packages have been patched to correct this issue.
 
 raptor2 for Mandriva Linux 2011 has been upgraded to the 2.0.7 version
 which is not vulnerable to this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0037
 http://www.libreoffice.org/advisories/CVE-2012-0037/
 ___

 Updated Packages:

 Mandriva Linux 2010.1:
 24ec3d87dd77462b556f86859840eae1  
2010.1/i586/libraptor1-1.4.21-5.1mdv2010.2.i586.rpm
 85d61e2cd9d054d9da9211f4fa342f69  
2010.1/i586/libraptor-devel-1.4.21-5.1mdv2010.2.i586.rpm
 e8b11b034af2de18b785e82cb4a30660  
2010.1/i586/raptor-1.4.21-5.1mdv2010.2.i586.rpm 
 4379f2bfca9cfc03d297058d9635156a  
2010.1/SRPMS/raptor-1.4.21-5.1mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 44aa890dd881c56e92f2b3983f4bc686  
2010.1/x86_64/lib64raptor1-1.4.21-5.1mdv2010.2.x86_64.rpm
 068c7d529fb465a3238f51179651ba2f  
2010.1/x86_64/lib64raptor-devel-1.4.21-5.1mdv2010.2.x86_64.rpm
 76bf6ce10c21fcc1c5f27e39d08b260d  
2010.1/x86_64/raptor-1.4.21-5.1mdv2010.2.x86_64.rpm 
 4379f2bfca9cfc03d297058d9635156a  
2010.1/SRPMS/raptor-1.4.21-5.1mdv2010.2.src.rpm

 Mandriva Linux 2011:
 e94c657f023e62cd238ea2f83ae0d88a  
2011/i586/libraptor1-1.4.21-5.1-mdv2011.0.i586.rpm
 79e92a9a81648805e7ae4cb28eb888f2  
2011/i586/libraptor2_0-2.0.7-0.1-mdv2011.0.i586.rpm
 11eef49d485d71baf0a11b66b48db345  
2011/i586/libraptor2-devel-2.0.7-0.1-mdv2011.0.i586.rpm
 ae76f3b8f48824daa66675f4fc007235  
2011/i586/libraptor-devel-1.4.21-5.1-mdv2011.0.i586.rpm
 9a42145d50101d1b3f8348808638240a  
2011/i586/raptor-1.4.21-5.1-mdv2011.0.i586.rpm
 6c528626b8a2602fdcb1761eac68e25e  
2011/i586/raptor2-2.0.7-0.1-mdv2011.0.i586.rpm 
 7adcdbaed9ca771c734765e9ed92e8c4  2011/SRPMS/raptor-1.4.21-5.1.src.rpm
 404f1edc446a93566026bbee0fbc8210  2011/SRPMS/raptor2-2.0.7-0.1.src.rpm

 Mandriva Linux 2011/X86_64:
 c4c7ac5bf156c0d3f9bb1fd5740f347f  
2011/x86_64/lib64raptor1-1.4.21-5.1-mdv2011.0.x86_64.rpm
 83b05b1707a083e7cf76c67d5f646320  
2011/x86_64/lib64raptor2_0-2.0.7-0.1-mdv2011.0.x86_64.rpm
 f6c697b5e8ee115eb4e318a886105c35  
2011/x86_64/lib64raptor2-devel-2.0.7-0.1-mdv2011.0.x86_64.rpm
 aba11394c42aed7d4f99200900723837  
2011/x86_64/lib64raptor-devel-1.4.21-5.1-mdv2011.0.x86_64.rpm
 f557b8057cb4b8aa371f48626d8e2c11  
2011/x86_64/raptor-1.4.21-5.1-mdv2011.0.x86_64.rpm
 f7b4e5e149fb3d338c85eef948e16b27  
2011/x86_64/raptor2-2.0.7-0.1-mdv2011.0.x86_64.rpm 
 7adcdbaed9ca771c734765e9ed92e8c4  2011/SRPMS/raptor-1.4.21-5.1.src.rpm
 404f1edc446a93566026bbee0fbc8210  2011/SRPMS/raptor2-2.0.7-0.1.src.rpm

 Mandriva Enterprise Server 5:
 5d0221fba67389461f2808a8c1cf93fd  
mes5/i586/libraptor1-1.4.18-3.1mdvmes5.2.i586.rpm
 777bcd9d7035fcec459c2b0848ccb660  
mes5/i586/libraptor-devel-1.4.18-3.1mdvmes5.2.i586.rpm
 56c867304527d1b6ba5980b7d5c6e354  
mes5/i586/raptor-1.4.18-3.1mdvmes5.2.i586.rpm 
 5d90acb0be0fd63e90a5dec62a19dfdc  mes5/SRPMS/raptor-1.4.18-3.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 4680f20036dc383367955faab0ffb028  
mes5/x86_64/lib64raptor1-1.4.18-3.1mdvmes5.2.x86_64.rpm
 f40ea3da4964474fcf1acab58511d59b  
mes5/x86_64/lib64raptor-devel-1.4.18-3.1mdvmes5.2.x86_64.rpm
 593bb4d51e183ea45d416ff90ff4cb07  
mes5/x86_64/raptor-1.4.18-3.1mdvmes5.2.x86_64.rpm 
 5d90acb0be0fd63e90a5dec62a19dfdc  mes5/SRPMS/raptor-1.4.18-3.1mdvmes5.2.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabili

Re: Squid URL Filtering Bypass

2012-04-23 Thread Gabriel Menezes Nunes
Hi,

I tested against a server that I do not have access to the config
file, but I did some tests in a new installation of Squid and the acl
that allows CONNECT only in the SSL_PORTS works well for the CONNECT
to GET translation attack, because the CONNECT method will not work
for port 80. But the method of converting Host to IP still works.
Squid do a better job than McAfee Web Gateway.
But it is still possible to access any site with SSL enabled, like
GMail, Facebook and Youtube(known sites that are filtered in most
companies).
Another possible attack is to find a web proxy in the internet that
allows SSL connection(there are several of them in Google!). This way,
the attacker will access the normal sites (port 80) through this web
proxy and the web proxy through Squid.
McAfee Web Gateway blocks several of this web proxies in regular
configuration. But the appliance is vulnerable to the attacks
mentioned.
One radical method is to block any connection with just the IP
address. Force the user to use DNS hostnames. I do not know if it is
practical, but it will stop the attack.
Many people tell that it is not a attack, it is normal working of SSL
CONNECT Tunnel, but I guess if you block a site in your
institution/company and the users can access this site, it is a
vulnerability! So, why did you install a proxy, if you can't block
anything?
People will waste your bandwidth with videos, access porn and malware
sites without a problem. For me, it is a serious vulnerability.

Thanks for the feedback and the discussion.

Gabriel Menezes Nunes

> Can you please email these details and the squid.conf used to find it to
> the security bugs reporting address bugs at squid-cache.org.
>
> This appears to be an aspect of same-origin bypass (CVE-2009-0801) or
> something closely related.
>
> Thank You
> Amos Jeffries
> Squid Software Foundation
>


Re: McAfee Web Gateway URL Filtering Bypass

2012-04-23 Thread Vikram Dhillon
Hello,

We might be able to fix this by simply doing a ping to the website
before connecting, so that the IP of the host specified matches the
connect field. In any case, the consistency of the host and connect is
indeed a big design flaw.

- Vikram

On Mon, Apr 16, 2012 at 6:12 PM, Gabriel Menezes Nunes
 wrote:
> # Exploit Title: McAfee Web Gateway URL Filtering Bypass
> # Date: 16/04/2012
> # Author: Gabriel Menezes Nunes
> # Version: McAfee Web Gateway
> # Tested on: McAfee Web Gateway 7.0
> # CVE: CVE-2012-2212
>
>
> I found a vulnerability in McAfee Web Gateway 7 that allows access to
> filtered sites.
> The appliance believes in the Host field of HTTP Header using CONNECT method.
> Example
>
> CONNECT 66.220.147.44:443 HTTP/1.1
> Host: www.facebook.com
>
>
> It is blocked.
>
> CONNECT 66.220.147.44:443 HTTP/1.1 (without host field)
>
> It is blocked.
>
> But:
>
> CONNECT 66.220.147.44:443 HTTP/1.1
> Host: www.uol.com.br (allowed url)
>
> The connection works.
>
> From here, I can send SSL traffic without a problem. This way, I can
> access any blocked site that allows SSL connections.
> Others test that I did is convert GET methods in CONNECT methods.
>
> GET http://www.facebook.com HTTP/1.1
> Host: www.facebook.com
>
> in
>
> CONNECT 66.220.147.44:80 HTTP/1.1
> Host: www.uol.com.br
>
> It will connect.
>
> and after it is possible to send the GET packets. It will work!
>
> This vulnerability is different from the CONNECT Tunnel method. The
> flaw is on the Host field processing. The appliance believes on this
> field.
>
> So, any sites can be accessed. URL filtering in this device/software
> is irrelevant and useless.
> One of the most important (if not the most important) feature of this
> kind of device is to protect the network in accessing specific URLs.
> So, this flaw is very dangerous, and it can be implemented even in
> malwares, bypassing any protection.
> I developed a python script that acts like a proxy and it uses this
> flaw to access any site.
> This tool is just a proof of concept.



-- 
Regards,
Vikram Dhillon

~~~
To perceive is to suffer.


Re: Squid URL Filtering Bypass

2012-04-23 Thread Amos Jeffries

On 17/04/2012 10:11 a.m., Gabriel Menezes Nunes wrote:

# Exploit Title: Squid URL Filtering Bypass
# Date: 16/04/2012
# Author: Gabriel Menezes Nunes
# Version: Squid Proxy
# Tested on: Squid Proxy 3.1.19
# CVE: CVE-2012-2213


I found a vulnerability in Squid Proxy that allows access to filtered sites.
The software believes in the Host field of HTTP Header using CONNECT method.
Example

CONNECT 66.220.147.44:443 HTTP/1.1
Host: www.facebook.com


It is blocked.

CONNECT 66.220.147.44:443 HTTP/1.1 (without host field)

It is blocked.

But:

CONNECT 66.220.147.44:443 HTTP/1.1
Host: www.uol.com.br (allowed url)

The connection works.

 From here, I can send SSL traffic without a problem. This way, I can
access any blocked site that allows SSL connections.


This vulnerability is different from the CONNECT Tunnel method. The
flaw is on the Host field processing. The software believes on this
field.

So, any sites can be accessed. URL filtering in this software is
irrelevant and useless.
One of the most important (if not the most important) feature of this
kind of device is to protect the network in accessing specific URLs.
So, this flaw is very dangerous, and it can be implemented even in
malwares, bypassing any protection.
I developed a python script that acts like a proxy and it uses this
flaw to access any site.
This tool is just a proof of concept.


Can you please email these details and the squid.conf used to find it to 
the security bugs reporting address bugs at squid-cache.org.


This appears to be an aspect of same-origin bypass (CVE-2009-0801) or 
something closely related.


Thank You
Amos Jeffries
Squid Software Foundation


[SECURITY] [DSA 2455-1] typo3-src security update

2012-04-23 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2455-1   secur...@debian.org
http://www.debian.org/security/Nico Golde
April 20, 2012 http://www.debian.org/security/faq
- -

Package: typo3-src
Vulnerability  : missing input sanitization
Problem type   : remote
Debian-specific: no
CVE IDs: CVE-2012-2112
Debian bug : 669158

Helmut Hummel of the typo3 security team discovered that typo3, a web
content management system, is not properly sanitizing output of the
exception handler.  This allows an attacker to conduct cross-site
scripting attacks if either third-party extensions are installed that do
not sanitize this output on their own or in the presence of extensions
using the extbase MVC framework which accept objects to controller actions.


For the stable distribution (squeeze), this problem has been fixed in
version 4.3.9+dfsg1-1+squeeze4.

For the testing (wheezy) and unstable (sid) distributions, this problem
will be fixed soon.

We recommend that you upgrade your typo3-src packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk+RpV4ACgkQHYflSXNkfP+VIACfbEir6HamwuelZk/0+SbuJjCO
wKQAn0f6DWR7lIzlK6JLw1hpEGusPDRy
=NPIT
-END PGP SIGNATURE-