QNAP Turbo NAS Multiple Path Injection

2012-09-05 Thread Andrea Fabrizi
**
Vulnerability: Multiple Path Injection
Product: QNAP Turbo NAS
Vendor: QNAP
Version affected: = 3.7.3 build 20120801
Status: Unpatched
Website: http://web.qnap.com/pro_detail_feature.asp?p_id=202
Discovered by: Andrea Fabrizi
Email: andrea.fabr...@gmail.com
Web: http://www.andreafabrizi.it
**

This vulnerability has been discovered on QNAP TS-1279U-RP, but probably
other products that use the same firmware may be affected.

The CGI /cgi-bin/filemanager/utilRequest.cgi is prone to a path
injection, which makes it possible,
for authenticated users, to access, delete o modify any file, included
system files, configuration files and
files owned by other users.

Due to the single user configuration of the embedded linux system, it
is possible to access
any system file without restrictions (included /etc/shadow, that
contains the hash of the administrator password).

Vulnerable parameters are (the list is not exhaustive):
/cgi-bin/filemanager/utilRequest.cgi [source_file]
/cgi-bin/filemanager/utilRequest.cgi?func=delete [file_name]
/cgi-bin/filemanager/utilRequest.cgi?func=copy [dest_path]
/cgi-bin/filemanager/utilRequest.cgi?func=move [dest_path]
/cgi-bin/filemanager/utilRequest.cgi?func=get_acl_properties [name]

Sample HTTP request:
###
POST /cgi-bin/filemanager/utilRequest.cgi/test.txt HTTP/1.1
Host: 192.168.0.10
Content-Type: application/x-www-form-urlencoded
Content-Length: 123

isfolder=0func=downloadsid=12345abcsource_total=1source_path=/myFilessource_file=../../../etc/shadow
###


VMWare Tools susceptible to binary planting by hijack

2012-09-05 Thread moshez
Security Advisory - VMWare Tools susceptible to binary planting by hijack
=
Summary   : VMWare Tools susceptible to binary planting
Date  : 4 September 2012
Affected versions : Product versions prior to -
Workstation 8.0.4
Player 4.0.4
Fusion 4.1.2
View 5.1
ESX 5.0 P03
ESX 4.1 U3
Not affected: ESX 4.0, ESX 3.5
CVE reference : CVE-2012-1666

Details

VMWare Tools handles many functions involved with host-guest interactivity,
providing a richer environment for the end-user and server administrators alike.
Part of VMWare Tools responsibilities is handling printer services through host
and is called by a third-party acquired tool (ThinPrint).

During initiation, which occurs during many steps throughout printer comm.
negotiation, a non-existent dynamic-link library is called, resulting in an
unqualified dynamic-link library call to 'tpfc.dll'.

A user with local disk access can carefuly construct a DLL that suits the
pattern that is being traversed by the client and implement it somewhere along
the search path and the client will load it seamlessly.

Impact

After the DLL has been implemented, an unsuspected user that will run printer
services, for example, will cause it to load, resulting in arbitrary code
execution under user's privilege level.

This vector of attack is mainly used in a local privilege escalation scenarios,
user credential harvesting and can be used by malware to disguise itself,
amongst other uses.

Proof of Concept


#include windows.h 

int hijack_poc () 
{ 
  WinExec ( calc.exe , SW_NORMAL );
  return 0 ; 
} 
  
BOOL WINAPI DllMain 
 (  HINSTANCE hinstDLL , 
DWORD dwReason ,
LPVOID lpvReserved ) 
{ 
  hijack_poc () ;
  return 0 ;
} 

Solution

Official patches were delivered by vendor and can be fetched from www.vmware.com

Credits

The issue was responsibly reported by Moshe Zioni from Comsec Global Consulting.

Timeline
=
4 September 2012
Security advisory released by Comsec Consulting
31 August 2012
Vendor finished on deploying fixes to products, release notes published
13 March 2012
Vendor started to implement fixes to products
14 February 2012
First response from vendor
13 February 2012
Bug reported by Moshe Zioni from Comsec Global Consulting
to VMWare and third-party printer driver developers in sync

References
=
VMWare
http://www.vmware.com
Release notes
https://www.vmware.com/support/vsphere4/doc/vsp_esxi41_u3_rel_notes.html#resolvedissuessecurity

Comsec Global Consulting
http://www.comsecglobal.com/


IPv6 implications on IPv4 nets: IPv6 RAs, IPv4, and VPN evasion

2012-09-05 Thread Fernando Gont
Folks,

draft-gont-opsec-ipv6-implications-on-ipv4-nets has been adopted as an
IETF opsec wg item (please see:
http://tools.ietf.org/html/draft-ietf-opsec-ipv6-implications-on-ipv4-nets)

I was thinking about discussing the following scenario, that I came up
with a few days ago:

A dual-stacked user (v6 enabled by default) visits an IPv4-only
network, and establish his VPN with his office (for mitigating
sniffing attacks, etc.).

A local attacker sends forged ICMPv6 RAs, thus triggering IPv6
configuration at the victim nodes.

If any of the remote nodes the victim is trying to visit is
IPv6-enabled, then it's possible/likely that the IPv6 destination
address will be used over the IPv4 one. in which case the victim will
send his traffic on the local network, as opposed to through the VPN.

Assuming the VPN product does not disable local v6 support, and that the
VPN does not provide IPv6 connectivity (*), this attack vector could
prove to be an interesting one (unexpected, to some extent).

(*) even then, this attack might still work.

Thoughts?

P.S.: Comments on the current version of the aforementioned
Internet-Draft will be welcome, too.

And yeah, our Twitter is @SI6Networks...

Thanks!

Best regards,
-- 
Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint:  31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492







eFront Educational v3.6.11 - Multiple Web Vulnerabilities

2012-09-05 Thread Vulnerability Lab
Title:
==
eFront Educational v3.6.11 - Multiple Web Vulnerabilities


Date:
=
2012-08-03


References:
===
http://www.vulnerability-lab.com/get_content.php?id=666


VL-ID:
=
666


Common Vulnerability Scoring System:

3.5


Introduction:
=
Tailored with larger organizations in mind, eFront Educational offers solutions 
for the management of companies most 
valued asset - the people. Based on a coherent approach to human capital 
management which keeps the workforce actively 
engaged, the eFront Educational platform offers the means of aligning learning 
programs with business goals to cultivate 
employee skills and knowledge associated with business performance. eFront 
Enterprise builds on top of eFront Educational.

(Copy of the Vendor Homepage: http://efrontlearning.net/product/ )


Abstract:
=
A Vulnerability Laboratory Researcher of the Vulnerability Laboratory Team 
discovered multiple web vulnerabilties in eFront v3.6.11 Educational.


Report-Timeline:

2011-08-03: Public Disclosure


Status:

Published


Affected Products:
==
eFront
Product: Educational v3.6.11


Exploitation-Technique:
===
Remote


Severity:
=
High


Details:

Multiple persistent input validation vulnerabilities are detected in the eFront 
Educational v3.6.11 Content Management System.
The vulnerabilities allow remote attackers to implement/inject malicious script 
code on the application side (persistent).
The first vulnerability is located in the profile module with the bound 
vulnerable firstname  lastname parameters. The bug 
allows a low privileged student account to exploit higher privileged trainer or 
administrator user accounts via registration.
Exploitation of the first vulnerability requires low privileged student 
elearning application user account.
The secound vulnerability is located in the Messages - New Folder Name module 
with the bound vulnerable folder listing.
Exploitation of the secound vulnerability requires low privileged student user 
account  is only local exploitable.
Successful exploitation of the vulnerabilities can lead to persistent session 
hijacking (manager/admin) or stable 
(persistent) context manipulation. 


Vulnerable Module(s):
[+] Profile - User (Administrator User Listing)
[+] Messages


Vulnerable Parameters(s):
[+] Firstname  Lastname
[+] Foldername


Proof of Concept:
=
The persistent input validation vulnerabilities can be exploited by remote 
attacker with a privileged student account.
For demonstration or reproduce ...


Review: Administrator - User Listing (Firstname  Lastname)

tr id=row_student class=oddRowColor 
tda 
href=http://efront.127.0.0.1:137/educational/www/administrator.php?ctg=personaluser=student;
 
class=editLinkspan id=column_studentiframe 
src=administrator.php-[PERSISTENT INJECTED SCRIPT CODE!])' = 
d.= (student)= span=/a/td

Affected URL(s):
http://efront.127.0.0.1:137/educational/www/student.php?ctg=personaluser=studentop=profile
http://efront.127.0.0.1:137/educational/www/administrator.php?ctg=users
http://efront.127.0.0.1:137/educational/www/administrator.php?ctg=personaluser=studentop=profile


Review: Messages - Add New Folder Name - Listing

td
span class=counter4./span
a href=http://efront.127.0.0.1:137/educational/www/student.php?ctg=messages;
folder=10iframe src=student-[PERSISTENT INJECTED SCRIPT CODE!])'  (0= 
messages,= 0kb)= a=
/td
td


Risk:
=
The security risk of the persistent web vulnerabilities are estimated as 
high(-).


Credits:

Vulnerability Laboratory [Research Team]  -Benjamin Kunz Mejri 
(b...@vulnerability-lab.com)


Disclaimer:
===
The information provided in this advisory is provided as it is without any 
warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and 
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, 
indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have 
been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential 
or incidental damages so the foregoing limitation 
may not apply. We do not approve or encourage anybody to break any vendor 
licenses, policies, deface websites, hack into databases 
or trade with fraud/stolen material.

Domains:www.vulnerability-lab.com   - www.vuln-lab.com  
   - www.vulnerability-lab.com/register
Contact:ad...@vulnerability-lab.com - supp...@vulnerability-lab.com 
   - resea...@vulnerability-lab.com
Section:

eFront Enterprise v3.6.11 - Multiple Web Vulnerabilities

2012-09-05 Thread Vulnerability Lab
Title:
==
eFront Enterprise v3.6.11 - Multiple Web Vulnerabilities


Date:
=
2012-08-06


References:
===
http://www.vulnerability-lab.com/get_content.php?id=668


VL-ID:
=
668


Common Vulnerability Scoring System:

3.5


Introduction:
=
Tailored with larger organizations in mind, eFront Enterprise offers solutions 
for the management of companies most 
valued asset - the people. Based on a coherent approach to human capital 
management which keeps the workforce actively 
engaged, the eFront Educational platform offers the means of aligning learning 
programs with business goals to cultivate 
employee skills and knowledge associated with business performance. eFront 
Enterprise builds on top of eFront Enterprise.

(Copy of the Vendor Homepage: http://efrontlearning.net/product/ )


Abstract:
=
A Vulnerability Laboratory Researcher of the Vulnerability Laboratory Team 
discovered multiple web vulnerabilties in eFronts v3.6.11 Enterprise CMS.


Report-Timeline:

2011-07-27: Vendor Notification
2011-08-06: Public Disclosure


Status:

Published


Affected Products:
==
eFront
Product: eLearning Enterprise Edition v3.6.11


Exploitation-Technique:
===
Remote


Severity:
=
High


Details:

Multiple persistent input validation vulnerabilities are detected in the eFront 
Enterprise v3.6.11 Content Management System.
The vulnerabilities allow remote attackers to implement/inject malicious script 
code on the application side (persistent).

The first vulnerability is located in the Organization  Organizational Profile 
module with the bound vulnerable Father name 
parameter and listing. The bug allows a low privileged trainee account to 
exploit higher privileged professor or administrator 
user accounts via organisation registration listing. Exploitation of the first 
vulnerability requires low privileged trainee 
elearning application user account.

The secound vulnerability is located in the Files module with the bound 
vulnerable file name listing.
Exploitation of the secound vulnerability requires low privileged trainee 
elearning application user account.

The thrid vulnerability is located in the `Write something about yourself` 
input message box module with the bound vulnerable 
listing. Exploitation of the 3rd vulnerability requires privileged 
trainee/professor/admin elearning application user account.
The third issue is only local exploitable because no affected output listing is 
available for the vulnerable 
`Write something about yourself` application module.


Successful exploitation of the vulnerabilities can lead to persistent session 
hijacking (professor/admin), persistent phsishing
attacks or stable (persistent) context manipulation. 


Vulnerable Module(s):
[+] Organization  Organizational Profile
[+] Files
[+] PANEL Index - Write something about 
yourself (Only local exploitable!)


Vulnerable Parameters(s):
[+] Father name [Organisation Listing]
[+] File Name [Listing]
[+] Message - Index [Listing]


Proof of Concept:
=
The persistent input validation vulnerabilities can be exploited by remote 
attackers with a low privileged trainee account.
For demonstration or reproduce ...


Review: Organization - Organization Profile (Fathername  Organisationname)

tbodytrtd class=labelCellFather name: /td
td class=elementCellinput class=inputText name=father value=
[PERSISTENT INJECTED SCRIPT CODE!])  type=text/td/tr
   trtd class=labelCellGender: /td
td class=elementCellselect class=inputText name=sex
option value=0 selected=selectedMale/option
option value=1Female/option
/select/td/tr
   trtd class=labelCellBirthday: /td
td class=elementCellselect name=birthday[d]
option value=1 selected=selected01/option
option value=202/option
option value=303/option
option value=404/option
option value=505/option
option value=606/option

URL: 
http://efront.127.0.0.1:1339/enterprise/www/student.php?ctg=personaluser=traineeop=org_form


Review: Files - File Name [Listing]

tr class=defaultRowHeight evenRowColortd class=centerAlignspan 
style=display:none/span
img src=student-Dateien/folder.png alt= title= border=0/tdtdspan 
id=span_%2Fvar%2Fwww%2Fvhosts%2F
demo%2Fenterprise%2Fupload%2Ftrainee%2Fmodule_hcd%2Fpublic%2F%22%3E%3Ciframe+src%3Da+[PERSISTENT
 INJECTED SCRIPT CODE!] 
style=display:none;%2Fvar%2Fwww%2Fvhosts%2Fdemo%2Fenterprise%2Fupload%2Ftrainee%2Fmodule_hcd
%2Fpublic%2F%22%3E%3C[PERSISTENT INJECTED SCRIPT CODE!]/spana 
class=editLink href=javascript:void(0) 
onclick=eF_js_rebuildTable($('filename_filesTable').down().getAttribute('tableIndex'),
 0, '', 'desc', 

Barracuda Web Filter 910 5.0.015 - Multiple Vulnerabilities

2012-09-05 Thread Vulnerability Lab
Title:
==
Barracuda Web Filter 910 5.0.015 - Multiple Vulnerabilities


Date:
=
2012-08-02


References:
===
http://www.vulnerability-lab.com/get_content.php?id=570

Barracuda Networks Security ID: BNSEC-279/BNYF-5533


VL-ID:
=
570


Common Vulnerability Scoring System:

4.5


Introduction:
=
The Barracuda Web Filter is an integrated content filtering, application 
blocking and malware protection 
solution that is powerful, easy to use and affordable for businesses of all 
sizes. It enforces Internet 
usage policies by blocking access to Web sites and Internet applications that 
are not related to business, 
and it easily and completely eliminates spyware and other forms of malware from 
your organization. No more 
productivity loss trying to repair computers or make computers usable again.

Blocks access to Web sites based on domain, URL pattern, or content category
Blocks downloads based on file type
Blocks applications that access the Internet, including IM, music services, and 
software update utilities
Integrates with  safe search  filters built into popular images search engines
Provides integrated gateway and desktop spyware protection
Uses Barracuda Web Security Agents compatible with Windows PC’s and Macs to 
enforce Internet policies on off-network computers

The Barracuda Web Filter combines preventative, reactive, and proactive 
measures to form a complete Web 
filtering solution. Designed for the enterprise, the Barracuda Web Filter 
enables you to set up custom policies 
for particular users and groups across customizable time ranges. The Barracuda 
Web Filter integrates with popular 
LDAP directory servers, such as Microsoft Active Directory, for both 
authentication and group membership 
information on which to apply custom policies. Sample uses of group policies 
include:

Restricting access to job board Web sites to only the Human Resources group
Defining separate policies for teachers and students at a school
Enabling compliance officers unrestricted access to the Web for investigation
Providing external instant messaging (e.g., AIM) access only to specific users 
or groups
Restricting personal Web browsing to non-working hours

For organizations that do not utilize directory servers, policies can be 
defined for unauthenticated users as a whole, 
locally defined users and groups, or network IP address ranges.

(Copy of the Vendor Homepage: 
http://www.barracudanetworks.com/ns/products/web-filter-overview.php )


Abstract:
=
The Vulnerability Lab Research Team discovered multiple Web Vulnerabilities in 
Barracudas Web Filter Application v5.0.0.015 Appliance Model 910.


Report-Timeline:

2012-05-01: Researcher Notification  Coordination
2012-05-08: Vendor Notification
2012-06-13: Vendor Response/Feedback
2012-07-25: Vendor Fix/Patch
2012-08-02: Public or Non-Public Disclosure


Status:

Published


Affected Products:
==
Barracuda Networks
Product: Barracuda Web Filter Appliance 910 v5.0.0.015


Exploitation-Technique:
===
Remote


Severity:
=
Medium


Details:

Multiple persistent input validation vulnerabilities are detected in the 
Barracudas Web Filter Application v5.0.0.015 Appliance Model 910. 
The bugs allow remote attackers to implement/inject malicious script code on 
the application side (persistent). Successful exploitation 
of the vulnerability can lead to session hijacking (manager/admin) or stable 
(persistent) context manipulation. Exploitation requires 
low user inter action. The vulnerability is located in the NTLM Edit - Host  
Domain Name which is bound to the affected vulnerable 
Existing Authentication Services listing.  Another vulnerability is located on 
the upload key tab in combination with the 
unsanitized short domain name input field + output listing.


Vulnerable Module(s):
[+] Authentification  New Authentication 
Service
   [-] NTLM - Server Hostname  Domain Name - 
Existing Authentication Services

[+] Authentification  Kerberos  Advanced 
Settings
   [-] Upload Key Tab File in combination with 
alternative Short Domain Name

Picture(s):
../1.png
../2.png


Proof of Concept:
=
The persistent web vulnerabilities can be exploited by remote attackers with 
high[-](medium+) user inter action or via 
local low privileged user account with low require user inter action. For 
demonstration or reproduce ...

Review: NTLM Edit  Listing

td colspan=2 style= valign=top width=285input autocomplete=off 
id=UPDATE_ntlm_server_hostname:
md5UBwQ8iCjrc1egk1wTV8SEg 
name=UPDATE_ntlm_server_hostname:md5UBwQ8iCjrc1egk1wTV8SEg size=30 value=
[PERSISTENT SCRIPT CODE EXECUTION!]  type=textbrdiv nowrap= 

Ektron CMS - Multiple Vulnerabilities - Security Advisory - SOS-12-009

2012-09-05 Thread Lists

Sense of Security - Security Advisory - SOS-12-009

Release Date.  05-Sep-2012
Last Update.   -  
Vendor Notification Date.  07-May-2012

Product.   Ektron CMS
Platform.  ASP.NET
Affected versions. Ektron CMS version 8.5.0 and possibly others
Severity Rating.   High
Impact.Exposure of sensitive information
  Exposure of system information
  System Access
Attack Vector. Remote without authentication
Solution Status.   Fixed in version 8.6 
  (not verified by SOS)

CVE reference. CVE - not yet assigned

Details.
The web application is vulnerable to multiple security
vulnerabilities, such as Unauthenticated File Upload and
XML eXternal Entities (XXE) injection.

1.Unauthenticated File Upload:
The form /WorkArea/Upload.aspx does not require authentication
to upload a file. By issuing a POST request with a webshell
embedded in a JPEG image and specifying the ASPX extension it is
possible to upload ASPX code to /uploadedimages/. The ASPX code
is placed in the comment section of the JPEG so that it survives
image resizing.

2.XXE Injection:
The XML parser at /WorkArea/Blogs/xmlrpc.aspx is vulnerable to
XML external entity attacks which can be used to Scan behind
perimeter firewalls or possibly include files from the local file
system e.g.
!DOCTYPE scan [!ENTITY test SYSTEM quot;http://localhost:22quot;]
scanamp;test;/scan

Solution.
Upgrade to version 8.6 and remove the /WorkArea/Blogs/xmlrpc.aspx file.

Discovered by.
Phil Taylor and Nadeem Salim from Sense of Security Labs.

About us.
Sense of Security is a leading provider of information security and
risk management solutions. Our team has expert skills in assessment 
and assurance, strategy and architecture, and deployment through to

ongoing management. We are Australia's premier application penetration
testing firm and trusted IT security advisor to many of the country's
largest organisations.


Sense of Security Pty Ltd 
Level 8, 66 King St

Sydney NSW 2000
AUSTRALIA

T: +61 (0)2 9290 
F: +61 (0)2 9290 4455
W: http://www.senseofsecurity.com.au
E: i...@senseofsecurity.com.au
Twitter: @ITsecurityAU

The latest version of this advisory can be found at:
http://www.senseofsecurity.com.au/advisories/SOS-12-009.pdf

Other Sense of Security advisories can be found at:
http://www.senseofsecurity.com.au/research/it-security-advisories.php



KIWICON: THE ANNUCIATION

2012-09-05 Thread Kiwicon
Dear bugtraq,

We the Kiwicon crüe beseech you with our annual CFP

If this whole rfc822 mail thing isnt your bag, we put this in a
pretag so it was web2.0;
https://www.kiwicon.org/the-con/cfp


---
KIWICON: THE ANNUCIATION

BOOK SIX, CHAPTER ONE

1 In the eighth month the messengers came unto the Crue, and said, Hail, thou
art highly favoured, blessed art thou among con organisers.

2 But when the Crue beheld the messengers, they were greatly troubled and
perplexed about what manner of salutation this should be.

3 And the messengers said Fear not, Crue, for thou shalt conceive and bring
forth a 'con, by name Kiwicon. It shall be great, and will reign over the
Wellington Opera House on the seventeenth and eighteenth days of November of
this year.

4 And the Crue said How shall this be, seeing as we know not speakers?

5 (an impudent harlot snickered biblically, amirite, but this utterance
lowereth the solemnity of the visitation, and she was shushed sternly from the
Most High)

6 And the messengers said unto them, Thou shalt make haste, and put out a CFP,
and the speakers will come unto thee, yea, unto the very ends of the earth they
will come.

7 And the Crue arose, cursing, and pulled out thine fingers.

8 If anyone is able to hear, let them listen, for here is wisdom. Those that
hath understanding, let them count the number of the beast; for it is the
number of the 'con: and its number is Six.

   ..
 .'|   .   ..  .   .   .|'.
|  | .'| .'||'.  .'| .'| .'| ___  ___  __   |  |
|  ||  ||  ||  ||  ||  ||  ||   _   ||_  ||  |  |  |
|  |  ||  ||  ||  ||  ||  | |__||  _\ | ||   '.|  |
|  ||  ||  ||  ||  ||  | | |___| ||  |'.   |
|  ||__||__||  ..  ||__||___\|___/|__|  |  |
| / |.'  '.| \ |
|/   SIX SIX SIX  \|
| NEW ZEALAND'S HACKER CON - WELLINGTON 17-18 NOV 2012 |

9 And the Crue opened the first seal and a voice cried out like the tolling of
great bronze bells. But yet the voice spake in modern English, because we can't
keep this up, saying, You must give a speaker slot to those who will speak of
great and wondrous things. Without these people your con will be shit, and
everyone will mutter about how much better it was last year, and lo, even the
year before that, and the year before that.  And you will know shame and hide
your faces, because they will be right.

10 The Crue obeyed, and asked the internet to ante up with the good
submissions; with wisdom and learning as of the elders of this nation, saving
those who speak like the braying of asses and cries of beasts in the
wilderness:

Thy Name:
Thy Country of Residence:
The Title:
The Length of Thy Parable (not a euphemism):
The Shortened Sunday School Version, Possibly With Hand Puppets:
Thy Ancestry:

11 Kiwicon 1 begat Kiwicon 2, which begat Kiwicon 3, which begat Kiwicon 4, and
it came to pass that Kiwicon 5 was begat from this lineage also, as the Crue
willed it, as they are somewhat slow learners.

12 This genealogy proveth that, like its antecedents, Kiwicon 6 will issue
forth in a single stream not unlike that of horses. For according to that which
thou asked asked for, the talk slots will be given.

13 Gannt charts were given by our Lord to project managers, and whilst smiting
these demons with lightning, the Crue accidentally scheduled short-form talks
of 5 minutes, which came to be know as Lightning Talks.

14 There is no foolishness in a hacker who spake only five minutes if that
hacker hath 5 minutes of content. The fool speaks for one hours length on
cyberwar, but drinketh for that day, and for the day following, and the
drooling on the person sitting next to them, of which photos were taken.

15 Verily transmitteth your response unto c...@kiwicon.org no later than eighth
day October, in this year of 2012.

16 On the twenty fourth day of September, the Crue will proclaim the names of
the beasts with the feet of a bear, who haveth submitted early and are
rewardeth thus with the fruit of a leopard.

17 (And lo, a digression rose from the sea with ten crowns of blasphemy, and to
that beast was given a mouth, to decry that the KJV does get a bit wack all up
in revelation, yo)

18 The Crue opened the second seal, and the internet spake, Aren't you guys
tired of this thing yet? 'Verily transmitteth', WTF?

19 And the Crue replied, Yea, for lo, this thee and thoust thing is confusing,
and we keep having to rewrite it, and now whilst has ceased to look like a real
word at all. And those with reading comprehension problems sang out in glorious
alleluias.

20 Kiwicon is not the worst computer security conference in .nz.  

Cross-Site Scripting (XSS) Vulnerabilities in Flogr

2012-09-05 Thread advisory
Advisory ID: HTB23110
Product: Flogr
Vendor: Flogr
Vulnerable Version(s): 2.5.6 and probably prior
Tested Version: 2.5.6
Vendor Notification: August 15, 2012 
Public Disclosure: September 5, 2012 
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: CVE-2012-4336
CVSSv2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Risk Level: Medium 
Discovered and Provided: High-Tech Bridge Security Research Lab ( 
https://www.htbridge.com/advisory/ ) 

---

Advisory Details:

High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in 
Flogr, which can be exploited to perform Cross-Site Scripting (XSS) attacks.


1) Cross-Site Scripting (XSS) Vulnerabilities  in Flogr: CVE-2012-4336

1.1 Input appended to the URL after /index.php is not properly sanitised before 
being returned to the user. 
This can be exploited to execute arbitrary HTML and script code in a user's 
browser session in context of an affected website.

The following PoC demonstrates the vulnerability:

http://[host]/index.php/%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E/

Successful exploitation of this vulnerability requires that Apache's directive 
AcceptPathInfo is set to on or default (default value is default) 

1.2 Input passed via arbitrary GET parameter to /index.php is not properly 
sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in user's 
browser session in context of an affected website.

The following PoC demonstrates the vulnerability:

http://[host]/index.php?[any]=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E



---

References:

[1] High-Tech Bridge Advisory HTB23110 - 
https://www.htbridge.com/advisory/HTB23110 - Cross-Site Scripting (XSS) 
Vulnerabilities  in Flogr.
[2] Flogr - http://code.google.com/p/flogr/ - Flogr is a flexible script that 
displays your flickr photos in a customizable photo gallery you host on your 
website.
[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - 
international in scope and free for public use, CVE® is a dictionary of 
publicly known information security vulnerabilities and exposures.
[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to 
developers and security practitioners, CWE is a formal list of software 
weakness types. 

---

Disclaimer: The information provided in this Advisory is provided as is and 
without any warranty of any kind. Details of this Advisory may be updated in 
order to provide as accurate information as possible. The latest version of the 
Advisory is available on web page [1] in the References.



Cross-Site Scripting (XSS) in Kayako Fusion

2012-09-05 Thread advisory
Advisory ID: HTB23095
Product: Kayako Fusion
Vendor: Kayako
Vulnerable Version(s): 4.40.1148 and probably prior
Tested Version: 4.40.1148
Vendor Notification: June 6, 2012 
Public Disclosure: September 5, 2012 
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: CVE-2012-3233
CVSSv2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Solution Status: Fixed by Vendor
Risk Level: Medium 
Discovered and Provided: High-Tech Bridge Security Research Lab ( 
https://www.htbridge.com/advisory/ ) 

---

Advisory Details:

High-Tech Bridge SA Security Research Lab has discovered vulnerability in 
Kayako Fusion, which can be exploited to perform Cross-Site Scripting (XSS) 
attacks.


1) Cross-Site Scripting (XSS) in Kayako Fusion: CVE-2012-3233

Input appended to the URL after 
/__swift/thirdparty/PHPExcel/PHPExcel/Shared/JAMA/docs/download.php is not 
properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in user's 
browser session in context of an affected website.

The following PoC (Proof of Concept) demonstrates the vulnerability:

http://[host]/__swift/thirdparty/PHPExcel/PHPExcel/Shared/JAMA/docs/download.php/%27%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E

Successful exploitation of this vulnerability requires that Apache's directive 
AcceptPathInfo is set to on or default (default value is default).

---

Solution:

Upgrade to Kayako Fusion 4.50.1581

More Information:
http://wiki.kayako.com/display/DOCS/4.50.1581

---

References:

[1] High-Tech Bridge Advisory HTB23095 - 
https://www.htbridge.com/advisory/HTB23095 - Cross-Site Scripting (XSS) in 
Kayako Fusion.
[2] Kayako Fusion - http://www.kayako.com - Kayako Fusion is the world's 
leading multi-channel helpdesk solution that enables organizations to deliver a 
better customer experience and work more effectively as a team, whatever their 
size.
[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - 
international in scope and free for public use, CVE® is a dictionary of 
publicly known information security vulnerabilities and exposures.
[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to 
developers and security practitioners, CWE is a formal list of software 
weakness types. 

---

Disclaimer: The information provided in this Advisory is provided as is and 
without any warranty of any kind. Details of this Advisory may be updated in 
order to provide as accurate information as possible. The latest version of the 
Advisory is available on web page [1] in the References.



[IMF 2013] Call for Papers

2012-09-05 Thread Oliver Goebel
Dear all,

for your information.

Please excuse possible cross postings.


CALL FOR PAPERS

   IMF 2013

  7th International Conference
   on IT Security Incident Management  IT Forensics

March 12th - 14th, 2013
  Nuremberg,  Germany



Conference Background
=
Today IT security is an integral aspect in operating IT-Systems.  Yet,
despite high-end precautionary measures taken, not every attack or
security mishap can be prevented and hence incidents will go on
happening.  In such cases forensic capabilities in investigating
incidents in both technical and legal aspects are paramount.  Thus,
capable incident response and forensic procedures have gained essential
relevance in IT infrastructure operations and there is ample need for
research and standardization in this area.

In law enforcement IT forensics is an important branch and its
significance constantly increases since IT has become an essential part
in almost every aspect of daily life. IT systems produce traces and
evidence in many ways that play a more and more relevant role in
resolving cases.


Conference Goals

The IMF conference provides a platform for experts from throughout the
world to present and discuss recent technical and methodical advances in
the fields of IT security incident response and management and IT
forensics.  It shall enable collaboration and exchange of ideas between
industry (both as users and solution providers), academia,
law-enforcement and other government bodies.


Conference Topics
=
The scope of IMF 2013 is broad and includes, but is not limited to the
following areas:
 
IT Security Incident Response
-
  * Incident Response Procedures and Methods
  * Incident Response Formats and Standardization 
  * Tools Supporting Incident Response
  * Incident Analysis
  * CERTs/CSIRTs
  * Information Sources, Information Exchange, Communities
  * Dealing with Vulnerabilities (Vulnerability Response)
  * Monitoring and Early Warning
  * Incident Response in Non-Standard Environments (e.g. Embedded 
Systems)
  * Education and Training
  * Organizations
  * Legal and Enterprise Aspects (Jurisdiction, Applicable Laws 
and Regulations)

IT Forensics

  * Trends and Challenges in IT Forensics
  * Application of Forensic Techniques in New Areas
  * Tools and Technology in Procedures for IT Forensics
  * Methods for the Gathering, Handling, Processing and Analysis of 
Digital Evidence
  * Evidence Protection in IT Environments
  * IT Forensics in Non-Standard Environments (e.g. Embedded Systems)
  * Source-Determination and Manipulation Detection (e.g. Multimedia
Forensics)
  * Standardization in IT Forensics
  * Education and Training
  * Organizations
  * Legal and Enterprise Aspects (Jurisdiction, Applicable Laws 
and Regulations)


Submission Details
==
IMF invites to submit full papers of up to 20 pages, presenting novel
and mature research results as well as practice papers, describing best
practices, case studies or lessons learned of up to 20 pages. Proposals
for workshops, discussions and presentations on practical methods and
challenges are also welcome.

All submissions must be written in English (see below), and either in
postscript or PDF format. Submissions must be anonymized. Authors of
accepted papers must ensure that their papers will be presented at the
conference. Submitted full papers must not substantially overlap papers
that have been published elsewhere or that are simultaneously submitted
to a journal or a conference with proceedings.

All submissions will be reviewed by the program committee and papers
accepted to be presented at the conference will be included in the
conference proceedings.

Submission Guidelines
-
http://www.imf-conference.org/imf2013/

Language

IMF 2013's scope is international hence all submissions must be written
in English. Presentations of accepted papers also must be done in
English.


Publication
===
Accepted papers will be published by the IEEE Computer Society's
Conference Publishing Services. Each participant of the conference will
receive a printed copy.


Dates and Deadlines
===

October 15th, 2012: Deadline for submissions
December 3th, 2012: Notification of acceptance or rejection 
December 10th, 2012: Due date for final camera ready copies 
March 12th through 14th, 2013: IMF 2013 Conference


Fees and Registration Information
=
Information on fees and registration will be available at
http://www.imf-conference.org/imf2013/


Conference Chair

Felix Freiling

APPLE-SA-2012-09-05-1 Java for OS X 2012-005 and Java for Mac OS X 10.6 Update 10

2012-09-05 Thread Apple Product Security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

APPLE-SA-2012-09-05-1 Java for OS X 2012-005 and
Java for Mac OS X 10.6 Update 10

Java for OS X 2012-005 and Java for Mac OS X 10.6 Update 10 are now
available and address the following:

Java
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7 or later, OS X Lion Server v10.7 or later,
OS X Mountain Lion 10.8 or later
Description:  An opportunity for security-in-depth hardening is
addressed by updating to Java version 1.6.0_35. Further information
is available via the Java website at
http://www.oracle.com/technetwork/topics/security/alert-
cve-2012-4681-1835715.html
CVE-ID
CVE-2012-0547

Java for OS X 2012-005 and Java for Mac OS X 10.6 Update 10
may be obtained from the Software Update pane in System Preferences,
or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

For Mac OS X v10.6 systems
The download file is named: JavaForMacOSX10.6.dmg
Its SHA-1 digest is: 6218979ae4eaef5ea7849cb4455e2c6f8bf362d2

For OS X Lion and Mountain Lion systems
The download file is named: JavaForOSX.dmg
Its SHA-1 digest is: e0750c72972b8a2ccbcb3144bb31d74419276387

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org

iQIcBAEBAgAGBQJQRoIGAAoJEPefwLHPlZEwqLIQAI/iwWUZRJ17R8WepzGdMtOC
7CfvG6Xm4sO56jEz5Idg8elpKaoDr5xzjyBO0PF/I+vM2DJo5X6Dm25r7TstWHVe
/Ucnan0yRbn6bqUgsKyAubQy+yENxJEr3ed/xe+EUcRvw8mX/kHH7Rq0boMtxx3D
eyq/t8Z4rY3B4BLS0RPG0sKNR2cNetE1yNKxHNskOAc3qsgv8oa7XgR9q+z3lHbS
t+BWp3dDF+gcTzdPJVzE1ksC4MCnPYYA6qoNVSj5o8AFU6ZJ5BGaQWIVY67qXZt4
yls0P4bV0LZbrVolrfzpysfgoACT8NutibJ9fWe8UjqN8t+0NvsWKMQIO/Yye4uF
aqWUB6P8uzaVEXksIuDuLtLLF0IhdWk7l9wcW9L4h/vgFvcwtT8o7fTn1av7zBhO
CP/sF3iM8n50b42m/dD+nkriIlreH7tWMo5C+GgEKaXSgG9YeqnzzCXf30P20wxF
oYfpwGgGKrVvojUbuPfZOUe8bpQNoCec8TNtXjZAuOYkE7Ku7RXPeB0Y1znINVNj
VXfQcsJlSEjkqS5TYofaNZ3Qk4hVUbexTwuHCMxevY0L1k7PId829wzoPoE70vSw
0BCYAHZzeCkfQpc+jElB8a3rXStYtAvc8OhI2Wq6bLHVclokFSk7YbmrEGDMGM/Z
vCB4qLe1cpGMcRIoYGdA
=v5mf
-END PGP SIGNATURE-


[Rooted CON 2013] CFP starts!

2012-09-05 Thread Román Ramírez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Hello all,

Here you've attached all the necessary information for any potential
speakers willing to have a talk at Rooted CON 2013.

Kind regards to all and thanks in advance

__ _   _   ___  _   _
   / /  _ \ ___   ___ | |_ ___  __| |/ ___/ _ \| \ | |
  / /| |_) / _ \ / _ \| __/ _ \/ _` | |  | | | |  \| |
 / / |  _  (_) | (_) | ||  __/ (_| | |__| |_| | |\  |
/_/  |_| \_\___/ \___/ \__\___|\__,_|\\___/|_| \_|

RootedCON 2013 - 'Call for Papers'


PLEASE, READ CAREFULLY ALL THE DETAILS IN THIS DOCUMENT.


- -=] About RootedCON

RootedCON is a security congress that will take place between March 7
to 9, 2013 in Madrid (Spain).

With an estimated capacity of 670 people, is one of the largest
specialized conferences ever undertaken in the country and one of the
largest in Europe, with
profiles of attendees ranging from students, state forces, through
market professionals in IT security or simply technology enthusiasts.

- -=] Types of talks

Two type of talks can be accepted:

- - Fast talks: 20 minutes.
- - Standard talks: 50 minutes.

There will be a limited number of each of the types and may even adapt the
calendar for an interesting talk extends beyond 20 minutes
or, for specific needs, reducing a 50 minutes one.

- -=] Topics

Any relevant topic associated with the concept of Hacking, for
example, and not being these the only topics that interest us:

- - Hacking, cracking, phreaking, virii, WiFi, VoIP, GSM...
- - Critical Infrastructure Security, SCADA environments...
- - Hardware Hacking, Jtag, SWJ, Dap, ...
- - Console and gaming hacking.
- - Mobile terminals: android, iOS, Windows mobile, maemo,...
- - Reverse engineering, debugging, hooking, fuzzing, exploiting,...
- - Innovative tools and techniques both for defense and attack.
- - APT, botnets and malware.
- - (In)security cloud, virtual environments,...
- - Cryptographical techniques, steganography, covert channels,...
- - Forensics and antiforensics.
- - Networking, level2 and level3,...
- - Very original talks like the kind of audience we have...

In the last edition, there were popular talks related to Hardware
Hacking, modificating the behavior of robots, specialized hardware,
or even devices creation. Related Keywords: Drones, Arduino, *copters,
Roomba, alarms, Jtag, cameras ...

For this edition, we are especially interested in 0days
vulnerabilities and all kinds of security problems in whatever
critical infrastructures or platforms.

- -=] Papers submission procedure

We only accept talks submissions through the online form which has
been prepared for this purpose:

https://www.rootedcon.es/cfp2013-en/(english)
https://www.rootedcon.es/cfp2013-es/(spanish)

Any other submission method will not be considered as official and
will not be evaluated by the selection team.

- -=] Schedule and milestones

05 Sep 2012 -   Launch of Call for papers
14 Dic 2012 -   Call For Papers closing
Dic 2012-   Get in touch and interviews with the speakers 
for final
confirmation.
Jan 2013-   Publication of speakers schedule.

*4 Feb 2012 -   Speakers materials submission to Rooted*

7, 8 y 9 Mar 2013   -   /RootedCON2013


- -=] Benefits and privileges as speaker

Each speaker will receive the following benefits and privileges:

- - A dinner with the rest of the speakers, RootedLabs teachers and
RootedCON crew.
- - Accommodation (costs assumed by the organization)
- - Travel (costs assumed by the organization)
- - Full access to the whole congress
- - Free drinks at the party ;)
- - Management of potential job opportunities.
- - A surprise in gratitude for participation.

- -=] Duties and responsibilities of speakers

All speakers presenting at RootedCON 2013 must:

a) Confirm that the presented paper is technical and accompanied by a
proof of concept (PoC).

b) Send the material of the talk prior to the dates of the Congress.
Within the
submission of material is important to include details about the demos
that will be performed.

c) Develop the slides according to the RootedCON 2013 official templates.

d) Explicitly accept that the materials presented, as well as video
and audio recordings
made shall be published in either mechanisms RootedCON content
management or
other media in the future. RootedCON *won't censor* any of the
materials, recordings,
media publication or whatever mechanisms by which are made accessible
to the public and the congress attendees.

- -=] Sponsors and Partners

RootedCON is always looking for quality sponsors and partners. If you
have a proposal or
you think your company may be interested, please contact us at:

sponsors-AT-rootedcon.es

IMPORTANT: Due to the highly technical subject of the congress, and
the preferences shown by attendees
in multiple surveys, we encourage potential sponsors who intend to
have a slot as speaker attempting 

[SECURITY] [DSA 2538-1] moin security update

2012-09-05 Thread Raphael Geissert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2538-1   secur...@debian.org
http://www.debian.org/security/  Raphael Geissert
September 05, 2012 http://www.debian.org/security/faq
- -

Package: moin
Vulnerability  : privilege escalation
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-4404

It was discovered that Moin, a Python clone of WikiWiki, incorrectly
evaluates ACLs when virtual groups are involved. This may allow certain
users to have additional permissions (privilege escalation) or lack
expected permissions.

For the stable distribution (squeeze), this problem has been fixed in
version 1.9.3-1+squeeze2.

For the testing distribution (wheezy), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in
version 1.9.4-8.

We recommend that you upgrade your moin packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAlBHnSAACgkQYy49rUbZzlpyrgCfWVw07a+DGjcWlbK09RF+Lw4Y
JAcAn1AdHlyFq+OfCLZ4gQhfBXcqxpw/
=+e4Z
-END PGP SIGNATURE-