[Full-disclosure] The email that hacks you

2012-11-28 Thread Bogdan Calin
Hi guys, I wrote a blog post about how an email can compromise your internal network when using iDevices in combination with a certain type of routers. http://www.acunetix.com/blog/web-security-zone/the-email-that-hacks-you/ -- Bogdan Calin - bogdan [at] acunetix.com CTO Acunetix Ltd. -

Re: [Full-disclosure] The email that hacks you

2012-11-28 Thread Bogdan Calin
Yes, I agree with you. However, my opinion it that it should be fixed once and for all in iOS/Webkit (and the other browsers) by disabling resources loaded with credentials. At some point, as a protection for phishing, URLs with the format scheme://username:password@hostname/ were disabled.

Re: [Full-disclosure] The email that hacks you

2012-11-28 Thread Christian Sciberras
From an architectural perspective, auto logins or whatever they're called should work through a random string, just as most providers already do. There is absolutely no reason to pass the username/password from a URL, especially when in plain text as in these cases. Since there is no loss of

[Full-disclosure] [SECURITY] [DSA 2578-1] rssh security update

2012-11-28 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-2578-1 secur...@debian.org http://www.debian.org/security/ Yves-Alexis Perez November 28, 2012

[Full-disclosure] Apple WGT Dictionnaire 1.3 - Script Code Inject Vulnerability

2012-11-28 Thread Vulnerability Lab
Title: == Apple WGT Dictionnaire 1.3 - Script Code Inject Vulnerability Date: = 2012-11-27 References: === http://www.vulnerability-lab.com/get_content.php?id=774 VL-ID: = 774 Common Vulnerability Scoring System: 2.3 Introduction:

[Full-disclosure] Paypal Bug Bounty #11 - Redirection Web Vulnerability

2012-11-28 Thread Vulnerability Lab
Title: == Paypal Bug Bounty #11 - Redirection Web Vulnerability Date: = 2012-11-22 References: === http://www.vulnerability-lab.com/get_content.php?id=648 VL-ID: = 648 Common Vulnerability Scoring System: 2 Introduction:

[Full-disclosure] Paypal Bug Bounty #27 - Community Web Vulnerability

2012-11-28 Thread Vulnerability Lab
Title: == Paypal Bug Bounty #27 - Community Web Vulnerability Date: = 2012-11-24 References: === http://www.vulnerability-lab.com/get_content.php?id=704 VL-ID: = 704 Common Vulnerability Scoring System: 2.1 Introduction:

[Full-disclosure] Paypal Bug Bounty #21 - Persistent Encoding Vulnerability

2012-11-28 Thread Vulnerability Lab
Title: == Paypal Bug Bounty #21 - Persistent Encoding Vulnerability Date: = 2012-11-25 References: === http://www.vulnerability-lab.com/get_content.php?id=684 VL-ID: = 684 Common Vulnerability Scoring System: 3 Introduction:

Re: [Full-disclosure] Remote Command Execution on Cisco WAG120N

2012-11-28 Thread Gary
On Mon, Nov 26, 2012 at 6:11 AM, Benji wrote: Command execution through Dynamic DNS setup is quite clearly not expected functionality. Agreed but that's still not remote command execution per my explanation below. On Tue, Nov 27, 2012 at 9:33 AM, andfarm wrote: Through cross-site request

Re: [Full-disclosure] The email that hacks you

2012-11-28 Thread Guifre
Hello, I can also confirm that this attack works on iPhone, iPad and Mac's default mail client. Of course, it works anywhere where arbitrary client-side code can be executed... IMAHO, the issue here is not your iphone loading images, there are millions of attack vectors to trigger this attack...

Re: [Full-disclosure] The email that hacks you

2012-11-28 Thread aditya
I totally agree with Christian, it is as insane as passing username and passwords using GET requests. But congrats Bogdan for the bringing to us a nice hack. Have u shared the code as well Bogdan? On Wed, Nov 28, 2012 at 5:07 PM, Christian Sciberras uuf6...@gmail.comwrote: From an

[Full-disclosure] Hacking Competition PHDAYS CTF Quals 2012 Starts

2012-11-28 Thread PHD
The qualifying stage of the PHDays CTF international information security contest starts in December. The teams will try their hands at security assessment, vulnerabilities detection and exploitation as well as fulfilling reverse engineering tasks. The conditions of PHDays CTF Quals, as

Re: [Full-disclosure] The email that hacks you

2012-11-28 Thread aditya
Please if you could share the code, I would like to test it for my router as well. Thanks On Wed, Nov 28, 2012 at 6:02 PM, Bogdan Calin bog...@acunetix.com wrote: Thanks aditya, The code is not published on the blog post but it's visible in the video. It's very simple to reproduce this

Re: [Full-disclosure] The email that hacks you

2012-11-28 Thread Bogdan Calin
Thanks aditya, The code is not published on the blog post but it's visible in the video. It's very simple to reproduce this problem. On 11/28/2012 1:53 PM, aditya wrote: I totally agree with Christian, it is as insane as passing username and passwords using GET requests. But congrats Bogdan

Re: [Full-disclosure] OT Google raises sploit bounties

2012-11-28 Thread Georgi Guninski
On Tue, Nov 27, 2012 at 10:32:16PM -0800, Dan Kaminsky wrote: One Google employee responds to another Google employee about Google stuff... It's almost like security people at Google have been security people for a very long time, and are given a redonkulously long leash ;) --Dan I

Re: [Full-disclosure] OT Google raises sploit bounties

2012-11-28 Thread Dan Kaminsky
On Wed, Nov 28, 2012 at 6:23 AM, Georgi Guninski gunin...@guninski.comwrote: On Tue, Nov 27, 2012 at 10:32:16PM -0800, Dan Kaminsky wrote: One Google employee responds to another Google employee about Google stuff... It's almost like security people at Google have been security

Re: [Full-disclosure] OT Google raises sploit bounties

2012-11-28 Thread Michal Zalewski
I would be interested what bounties they would pay for operation Аврора or for a botnet of say 1M host. Reward amounts are public; for example, here are the rules for the web app program: http://www.google.com/about/appsecurity/reward-program/ Neither malware on user machines nor attacking

Re: [Full-disclosure] Apple WGT Dictionnaire 1.3 - Script Code Inject Vulnerability

2012-11-28 Thread Thor (Hammer of God)
On Nov 27, 2012, at 5:52 PM, Vulnerability Lab resea...@vulnerability-lab.com wrote: Proof of Concept: = The software validation vulnerability can be exploited by local attackers with required user interaction and privileged local system account. For demonstration or

[Full-disclosure] [Security-news] SA-CONTRIB-2012-167 - Mixpanel - Cross site scripting (XSS)

2012-11-28 Thread security-news
View online: http://drupal.org/node/1853198 * Advisory ID: DRUPAL-SA-CONTRIB-2012-167 * Project: Mixpanel [1] (third-party module) * Version: 6.x * Date: 2012-November-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2012-169 - Email Field - Cross Site Scripting and Access bypass

2012-11-28 Thread security-news
View online: http://drupal.org/node/1853214 * Advisory ID: DRUPAL-SA-CONTRIB-2012-169 * Project: Email Field [1] (third-party module) * Version: 6.x * Date: 2012-11-28 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting, Access bypass

[Full-disclosure] [Security-news] SA-CONTRIB-2012-170 - MultiLink - Access Bypass

2012-11-28 Thread security-news
View online: http://drupal.org/node/1853244 * Advisory ID: DRUPAL-SA-CONTRIB-2012-170 * Project: Multi-Language Link and Redirect (MultiLink) [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-November-28 * Security risk: Moderately critical [2] * Exploitable from: Remote

[Full-disclosure] [Security-news] SA-CONTRIB-2012-168 - Services - Information Disclosure

2012-11-28 Thread security-news
View online: http://drupal.org/node/1853200 * Advisory ID: DRUPAL-SA-CONTRIB-2012-168 * Project: Services [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-11-28 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Information Disclosure

[Full-disclosure] [Security-news] SA-CONTRIB-2012-172 - Zero Point - Cross Site Scripting (XSS)

2012-11-28 Thread security-news
View online: http://drupal.org/node/1853376 * Advisory ID: DRUPAL-SA-CONTRIB-2012-172 * Project: Zero Point [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-November-28 * Security risk: Critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting