Re: [Full-disclosure] Slashdot defacement screenshot

2009-07-24 Thread sunjester
and we should believe a photo? sweet.

-- 
Founder/Activist
http://fusecurity.com/ | Free Security Technology
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Slashdot defacement screenshot

2009-07-24 Thread Cance Consulting
it must be true if it's on the internet

sunjester wrote:
 and we should believe a photo? sweet.

 -- 
 Founder/Activist
 http://fusecurity.com/ | Free Security Technology
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Former British cop 'has bank details of 40 million people'

2009-07-24 Thread Ivan .
http://www.news.com.au/technology/story/0,28348,25828444-5014239,00.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Stored XSS on Communigate Pro 5.2.14 and prior versions

2009-07-24 Thread Andrea Purificato - bunker
- Description
The Communigate Pro webmail framework is prone to a stored Cross Site
Scripting vulnerability through crafted plain text email messages.

- Affected version:
5.2.14 and prior as reported from Communigate:
http://www.communigate.com/cgatepro/History52.html

- Details
This vulnerability can be exploited if an attacker sends a plain text
message to the victim address containing a malicious crafted URL;
the internal parser fails to parse the malicious URL and executes
Javascript code every time user reads the message.
An attacker may be able to use this vulnerability to steal sensitive
information from a user's computer (e.g. current SessionID) or force
the user's computer to execute stealed operations.

- Example of crafted URL
http://www.example.com/z=;scriptalert(document.cookie)/scriptf=

- Patch
Install Communigate Pro 5.2.13
5.2.15 15-Jul-2009: * Bug Fix: WebUser: 5.1.2: links in plain text
messages could be processed incorrectly.

- Communigate
http://www.communigate.com/cgatepro/

-- 
Andrea Purificato
http://rawlab.mindcreations.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ISecAuditors Security Advisories] Joomla! 1.5.12 Multiple Full Path Disclosure vulnerabilities

2009-07-24 Thread ISecAuditors Security Advisories
=
INTERNET SECURITY AUDITORS ALERT 2009-009
- Original release date: July 21st, 2009
- Last revised:  July 23rd, 2009
- Discovered by: Juan Galiana Lara
- Severity: 5/10 (CVSS Base Score)
=

I. VULNERABILITY
-
Joomla!  1.5.12 Multiple Full Path Disclosure vulnerabilities

II. BACKGROUND
-
Joomla! is an award-winning content management system (CMS), which
enables you to build Web sites and powerful online applications. Many
aspects, including its ease-of-use and extensibility, have made
Joomla! the most popular Web site software available. Best of all,
Joomla! is an open source solution that is freely available to everyone.

III. DESCRIPTION
-
This vulnerability could allow a malicious user to view the internal
path information of the host due to some files were missing the check
for JEXEC.

IV. PROOF OF CONCEPT
-
The attacker can get the full path of the instalation of Joomla!
browsing to any of this urls:

http://example.com/joomla-1.5.12/libraries/joomla/utilities/compat/php50x.php
http://example.com/joomla-1.5.12/libraries/joomla/client/ldap.php
http://example.com/joomla-1.5.12/libraries/joomla/html/html/content.php

The information obtained contais the full path to the files:

bParse error/b:  syntax error, unexpected T_CLONE, expecting
T_STRING in
b/var/www/joomla-1.5.12/libraries/joomla/utilities/compat/php50x.php/b
on line b100/bbr /
bFatal error/b:  Class 'JObject' not found in
b/var/www/joomla-1.5.12/libraries/joomla/client/ldap.php/b on line
b21/bbr /
bFatal error/b:  Class 'JLoader' not found in
b/var/www/joomla-1.5.12/libraries/joomla/html/html/content.php/b
on line b15/bbr /

V. BUSINESS IMPACT
-
Full path disclosure vulnerabilities enables an attacker to know the
path to the web root. This information can be used in order to launch
further attacks.

VI. SYSTEMS AFFECTED
-
Joomla! versions prior and including 1.5.12 are vulnerable.

VII. SOLUTION
-
Upgrade to version 1.5.13

VIII. REFERENCES
-
http://www.joomla.org
http://www.isecauditors.com

IX. CREDITS
-
This vulnerability has been discovered
by Juan Galiana Lara (jgaliana (at) isecauditors (dot) com).

X. REVISION HISTORY
-
July  21, 2009: Initial release.
July  23, 2009: Last revision.

XI. DISCLOSURE TIMELINE
-
July  21, 2009: Discovered by Internet Security Auditors.
July  21, 2009: Vendor contacted.
July  22, 2009: Joomla! publish update. Great job.
July  24, 2009: Advisory published.

XII. LEGAL NOTICES
-
The information contained within this advisory is supplied as-is
with no warranties or guarantees of fitness of use or otherwise.
Internet Security Auditors accepts no responsibility for any damage
caused by the use or misuse of this information.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Slashdot hacked?

2009-07-24 Thread Ulisses Reina Montenegro de Albuquerque
How can one work as a CISSP? Please enlighten us, as it seems you get
God-almighty-like superpowers when you manage to land on a job like
that. Myself, I'm still a Not a CISSP.

http://www.veracode.com/blog/2008/04/not-a-cissp/


On Thu, 2009-07-23 at 23:24 +, Danila Wartho wrote:
 Hello Valter,
 
  To: compsec...@hotmail.com
  CC: full-disclosure@lists.grok.org.uk
  Subject: Re: [Full-disclosure] Slashdot hacked?
  From: valdis.kletni...@vt.edu
  Date: Thu, 23 Jul 2009 18:23:57 -0400
  
  On Thu, 23 Jul 2009 21:47:42 -, Compsec Guy said:
  
   What's wrong with Slashdot today?
  
  Oh my ghod, it's full of jews!!
  
 
 I don't see what the point is in pulling in the Germans in this
 discussion..
 
 
  (Hint: Before posting to a worldwide list asking what's wrong with a
 site,
  a few things to check:
  
  0) Wait at least 5-10 minutes to make sure it's not a short-lived
 issue that
  will be fixed before people have a chance to read your mail. Go have
 a beer,
  or a cookie, or something else age-appropriate. It will probably be
 better by
  the time you get back.
 
 
 The reverse should also apply.
 Now, did you wait 5-10 minutes to see if it was really hacked?
 
 
  1) Ask a friend (preferably in another country, or at least a
 different ISP)
  whether they see the issue as well.
 
 
 I work as a CISSP at an ISP. I know how these things works. You're out
 of control, man!
 
 
  2) Describe any steps you've taken to verify the problem isn't at
 your end.
  For instance, if you're using somebody else's wireless connection,
 maybe this
  happened to you:
 http://www.ex-parrot.com/pete/upside-down-ternet.html
 
 
 There's no need. As I said, I'm a CISSP.
 Now you get back to school, seems as if you still got stuff to learn
 about how the Internet works.
 
 
  3) Bill Joy's Law of Demos: Never precede a demo with anything more
  predictive than 'Watch This!'. When reporting a problem, don't do
 that.
  Give at least a rough idea of what you are observing - site times
 out,
  connection refused, connects but no pages returned, all pages have
 either
  goatse or n3td3v pictures on them, etc...
 
 
 You've got an attitude problem. I'm sorry, but you need help. 
 
 
  For the record, it looks fine from here (at least the front page)
  
  Latest story posted:
  
  Ask Slashdot: How To Vet Clever Ideas Without Giving Them Away? on
 Thursday July 23, @06:00PM
  Posted by timothy on Thursday July 23, @06:00PM
  from the don't-clever-ideas-want-to-be-free? dept. 
  
  So what do you *think* the problem is?
 
 
 You tell me.
 
 
  - Danila
 
 
 
 
 __
 Inte bara e-post - Windows LiveT är mycket mer än din inkorg. Mer än
 bara meddelanden 
 
 
 -- 
 .: ANTI-SPAM C.E.S.A.R :.
 Esta mensagem foi automaticamente classificada como LEGÍTIMA
 Se você acredita que É SPAM clique aqui
 
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
-- 
Ulisses Montenegro ulisses.montene...@cesar.org.br
Engenheiro de Sistemas
Centro de Estudos e Sistemas Avançados do Recife
http://www.cesar.org.br/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Drupal 6 Date/Calendar XSS Vulnerability

2009-07-24 Thread Justin Klein Keane
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Vulnerability Report

Date of Original Vendor Contact:  May 19, 2009 11:45 GMT -0400
Report Number:  8890
Author: Justin C. Klein Keane jus...@madirish.net
Details of this vulnerability are also posted at the public URL
http://lampsecurity.org/drupal-date-xss-vulnerability

Description of Vulnerability
- 
Drupal (http://drupal.org) is a robust content management system (CMS)
written in PHP and MySQL that provides extensibility through various
third party modules.  The Date and Calendar modules
(http://drupal.org/project/date, http://drupal.org/project/calendar)
provides functionality for constructing views based on dates for
calendar type displays.  The Calendar module suffers from a cross site
scripting (XSS) vulnerability due to the fact that it does not properly
sanitize names during display.

Systems affected:
- -
Drupal 6.12 with Date 6.x-2.2, Calendar 6.x-2.1 and Views 6.x-2.6 was
tested and shown to be vulnerable

Impact
- --
Authenticated users can exploit this vulnerability to escalate privilege
and take control of the web server process.

Mitigating factors:
- ---
Attacker must have 'use date tools' permissions in order to exploit this
vulnerability.  Permissions to 'administer views' are required to be
affected by the XSS (otherwise injected code results on pages to which
the user is denied access).

Proof of concept:
- -
1.  Install Drupal 6.12.
2.  Install Views, Date, and Calendar and enable all functionality
through Administer - Modules
3.  Click Administer - Content management - Date Tools
4.  Click 'Date wizard' to create a new content type
5.  Enter scriptalert('xss');/script in the Content type label
textarea
6.  Enter arbitrary data in other fields
7.  Click 'save' to view JavaScript alert

Alternatively this XSS can also be triggered by viewing content type:
1.  Click Administer - Content management - Date tools
2.  Click the 'calendar_date' link next to the new content type
3.  Observe JavaScript alert

Alternatively this XSS can also be triggered by editing the new view
from Administer - Site building - Views and clicking 'Edit' next to
the new 'calendar_date' view.

Timeline:
- ---
05-19-09 Drupal security notified of vulnerability
05-21-09 Drupal security acknowledges vulnerability, advises June 3 fix
06-02-09 Drupal security advises module maintainer asks for extension,
advise June 10 fix
06-10-09 Drupal security advises revised fix schedule
07-23-09 ORIGINATOR advises over a month has passed without update and
that disclosure will be made within 24 hours unless circumstances have
changed.  ORIGINATOR receives no response.
07-24-09 Public disclosure

Patch
- --
In order to mitigate this vulnerability apply the following patch:

- --- calendar/includes/calendar_plugin_display_page.inc  2009-01-10
15:04:17.0 -0500
+++ calendar/includes/calendar_plugin_display_page.inc  2009-07-24
08:55:23.234846590 -0400
@@ -107,7 +107,7 @@ class calendar_plugin_display_page exten
 $options['calendar_date_link'] = array(
   'category' = 'calendar_settings',
   'title' = t('Add new date link'),
- -  'value' = !empty($default) ? node_get_types('name', $default)
: '',
+  'value' = !empty($default) ? check_plain(node_get_types('name',
$default)) : '',
 );

   }


- --
Justin C. Klein Keane
http://www.MadIrish.net
http://www.LAMPSecurity.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with CentOS - http://enigmail.mozdev.org

iQD1AwUBSmm1bZEpbGy7DdYAAQKPIgb+O9ptCtRsCVvOTBfqZmMYClds1CHtBDWq
wdvEYiK6tsuVIcU6rEFjgGnrIEYz3mGTjxtIrdi9Y6YMfBKOX3TsjPt0SfjD3EwM
PLn40cRITh1vOXyvxqUZYDeOwh/3hdOZ1ecGG7vcpcClcc+dcIjrZxLzFy+qkClE
1JxkRIY8xrYMUM1uwBOvbx9n8C40RPhJJuqlrl3g44BLtkCjKuHL0DjGXeuJRRRB
AS4fI2YjwSHJv8I8KqiBy25tJgtCXxoSS81Wk6uXshlbgk4kfUP/MXtYQA/m+5SV
2tBY5Bn5qx8=
=h7na
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Slashdot defacement screenshot

2009-07-24 Thread Paul Schmehl

Or is some anonymous m1sp311ing twit s41d it was

--On Friday, July 24, 2009 01:48:57 -0500 Cance Consulting 
cance.consult...@gmail.com wrote:




it must be true if it's on the internet

sunjester wrote:

and we should believe a photo? sweet.



--
Paul Schmehl (pa...@utdallas.edu)
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/


p7seBoJQRuf6n.p7s
Description: S/MIME cryptographic signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Oracle CPUjul2009

2009-07-24 Thread Dennis Yurichev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi.

Information about four vulnerabilities patched in Oracle CPUjul2009:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2009.html
... is published at:

CVE-2009-1970:
http://blogs.conus.info/node/26

CVE-2009-1963
http://blogs.conus.info/node/25

CVE-2009-1019
http://blogs.conus.info/node/24

CVE-2009-1020
http://blogs.conus.info/node/23


- --
My PGP public key: http://yurichev.com/dennis.yurichev.asc
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkpqGgMACgkQ1YPmFmJG++NFPgCeMamcAUCDukcKDtD97hHddD1k
DmoAnjnmgL5o336jjgWDegy+Fb6ah2nZ
=izCd
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Slashdot hacked?

2009-07-24 Thread Valdis . Kletnieks
On Thu, 23 Jul 2009 21:47:42 -, Compsec Guy said:

 What's wrong with Slashdot today?

Oh my ghod, it's full of ponies!!

(Hint: Before posting to a worldwide list asking what's wrong with a site,
a few things to check:

0) Wait at least 5-10 minutes to make sure it's not a short-lived issue that
will be fixed before people have a chance to read your mail. Go have a beer,
or a cookie, or something else age-appropriate. It will probably be better by
the time you get back.

1) Ask a friend (preferably in another country, or at least a different ISP)
whether they see the issue as well.

2) Describe any steps you've taken to verify the problem isn't at your end.
For instance, if you're using somebody else's wireless connection, maybe this
happened to you: http://www.ex-parrot.com/pete/upside-down-ternet.html

3) Bill Joy's Law of Demos: Never precede a demo with anything more
predictive than 'Watch This!'.  When reporting a problem, don't do that.
Give at least a rough idea of what you are observing - site times out,
connection refused, connects but no pages returned, all pages have either
goatse or n3td3v pictures on them, etc...

For the record, it looks fine from here (at least the front page)

Latest story posted:

  Ask Slashdot: How To Vet Clever Ideas Without Giving Them Away? on Thursday 
July 23, @06:00PM
Posted by timothy on Thursday July 23, @06:00PM
from the don't-clever-ideas-want-to-be-free? dept. 

So what do you *think* the problem is?



pgpJgzJgAZyZq.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] GIF89A - Maximum expected value of LZW Minimum Code Size

2009-07-24 Thread Murthy N Srinivas-B22237
Hi,
 
What is maximum value that can be used for LZW Minimum Code Size for
GIF89A images?.
My guess is 11 decimal as the maximum output code value is FFF (12
bits).
 
It seems that this field can be used to generate buffer flows in remote
machines.
 
Thanks
-nsmurthy
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/