Hi guys,
I wrote a blog post about how an email can compromise your internal network
when using iDevices in
combination with a certain type of routers.
http://www.acunetix.com/blog/web-security-zone/the-email-that-hacks-you/
--
Bogdan Calin - bogdan [at] acunetix.com
CTO
Acunetix Ltd. -
Yes, I agree with you.
However, my opinion it that it should be fixed once and for all in iOS/Webkit
(and the other
browsers) by disabling resources loaded with credentials.
At some point, as a protection for phishing, URLs with the format
scheme://username:password@hostname/ were disabled.
From an architectural perspective, auto logins or whatever they're called
should work through a random string, just as most providers already do.
There is absolutely no reason to pass the username/password from a
URL, especially when in plain text as in these cases.
Since there is no loss of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2578-1 secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
November 28, 2012
Title:
==
Apple WGT Dictionnaire 1.3 - Script Code Inject Vulnerability
Date:
=
2012-11-27
References:
===
http://www.vulnerability-lab.com/get_content.php?id=774
VL-ID:
=
774
Common Vulnerability Scoring System:
2.3
Introduction:
Title:
==
Paypal Bug Bounty #11 - Redirection Web Vulnerability
Date:
=
2012-11-22
References:
===
http://www.vulnerability-lab.com/get_content.php?id=648
VL-ID:
=
648
Common Vulnerability Scoring System:
2
Introduction:
Title:
==
Paypal Bug Bounty #27 - Community Web Vulnerability
Date:
=
2012-11-24
References:
===
http://www.vulnerability-lab.com/get_content.php?id=704
VL-ID:
=
704
Common Vulnerability Scoring System:
2.1
Introduction:
Title:
==
Paypal Bug Bounty #21 - Persistent Encoding Vulnerability
Date:
=
2012-11-25
References:
===
http://www.vulnerability-lab.com/get_content.php?id=684
VL-ID:
=
684
Common Vulnerability Scoring System:
3
Introduction:
On Mon, Nov 26, 2012 at 6:11 AM, Benji wrote:
Command execution through Dynamic DNS setup is quite clearly not expected
functionality.
Agreed but that's still not remote command execution per my explanation below.
On Tue, Nov 27, 2012 at 9:33 AM, andfarm wrote:
Through cross-site request
Hello,
I can also confirm that this attack works on iPhone, iPad and Mac's
default mail client.
Of course, it works anywhere where arbitrary client-side code can be
executed... IMAHO, the issue here is not your iphone loading images,
there are millions of attack vectors to trigger this attack...
I totally agree with Christian, it is as insane as passing username and
passwords using GET requests. But congrats Bogdan for the bringing to us a
nice hack.
Have u shared the code as well Bogdan?
On Wed, Nov 28, 2012 at 5:07 PM, Christian Sciberras uuf6...@gmail.comwrote:
From an
The qualifying stage of the PHDays CTF international information security
contest starts in December.
The teams will try their hands at security assessment, vulnerabilities
detection and exploitation as well as fulfilling reverse engineering tasks. The
conditions of PHDays CTF Quals, as
Please if you could share the code, I would like to test it for my router
as well.
Thanks
On Wed, Nov 28, 2012 at 6:02 PM, Bogdan Calin bog...@acunetix.com wrote:
Thanks aditya,
The code is not published on the blog post but it's visible in the video.
It's very simple to reproduce this
Thanks aditya,
The code is not published on the blog post but it's visible in the video.
It's very simple to reproduce this problem.
On 11/28/2012 1:53 PM, aditya wrote:
I totally agree with Christian, it is as insane as passing username and
passwords using GET
requests. But congrats Bogdan
On Tue, Nov 27, 2012 at 10:32:16PM -0800, Dan Kaminsky wrote:
One Google employee responds to another Google employee about Google
stuff...
It's almost like security people at Google have been security people for a
very long time, and are given a redonkulously long leash ;)
--Dan
I
On Wed, Nov 28, 2012 at 6:23 AM, Georgi Guninski gunin...@guninski.comwrote:
On Tue, Nov 27, 2012 at 10:32:16PM -0800, Dan Kaminsky wrote:
One Google employee responds to another Google employee about Google
stuff...
It's almost like security people at Google have been security
I would be interested what bounties they would pay
for operation Аврора or for a botnet of say 1M host.
Reward amounts are public; for example, here are the rules for the web
app program:
http://www.google.com/about/appsecurity/reward-program/
Neither malware on user machines nor attacking
On Nov 27, 2012, at 5:52 PM, Vulnerability Lab resea...@vulnerability-lab.com
wrote:
Proof of Concept:
=
The software validation vulnerability can be exploited by local attackers
with required user interaction and privileged local system account.
For demonstration or
View online: http://drupal.org/node/1853198
* Advisory ID: DRUPAL-SA-CONTRIB-2012-167
* Project: Mixpanel [1] (third-party module)
* Version: 6.x
* Date: 2012-November-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1853214
* Advisory ID: DRUPAL-SA-CONTRIB-2012-169
* Project: Email Field [1] (third-party module)
* Version: 6.x
* Date: 2012-11-28
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting, Access bypass
View online: http://drupal.org/node/1853244
* Advisory ID: DRUPAL-SA-CONTRIB-2012-170
* Project: Multi-Language Link and Redirect (MultiLink) [1] (third-party
module)
* Version: 6.x, 7.x
* Date: 2012-November-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
View online: http://drupal.org/node/1853200
* Advisory ID: DRUPAL-SA-CONTRIB-2012-168
* Project: Services [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2012-11-28
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Information Disclosure
View online: http://drupal.org/node/1853376
* Advisory ID: DRUPAL-SA-CONTRIB-2012-172
* Project: Zero Point [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2012-November-28
* Security risk: Critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
23 matches
Mail list logo