[Full-disclosure] Drupal core XSS vulnerability

2013-08-14 Thread Justin C. Klein Keane
Author: Justin C. Klein Keane jus...@madirish.net Reported: 7 August, 2013 Description of Vulnerability: - - Drupal (http://drupal.org) is a robust content management system (CMS) written in PHP and MySQL. Drupal core suffers from multiple persistent (stored) cross site

Re: [Full-disclosure] Special Issue Threat Detection, Analysis and Defense of JISA

2013-08-09 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yes, yes, it is very common: http://www.crypto.com/blog/copywrongs/ Justin C. Klein Keane http://www.MadIrish.net Any digital signature on this message can be confirmed using the GPG key at http://www.madirish.net/gpgkey On 08/09/2013 06:08 AM

[Full-disclosure] XSS Vulnerability in TinyMCE

2013-03-11 Thread Justin C. Klein Keane
Vulnerability Report Author: Justin C. Klein Keane jus...@madirish.net Date: 5 March, 2013 CVE-2012-4230 Description of Vulnerability: - TinyMCE in itself can not be insecure (http://www.tinymce.com/wiki.php/Security) TinyMCE is a platform independent web based

[Full-disclosure] LAMPSecurity Capture the Flag

2013-01-09 Thread Justin C. Klein Keane
/projects/lampsecurity/files/CaptureTheFlag/CTF7/. Any and all feedback is appreciated. Cheers, - -- Justin C. Klein Keane http://www.MadIrish.net The PGP signature on this email can be verified using the public key at http://www.madirish.net/gpgkey -BEGIN PGP SIGNATURE- Version: GnuPG

Re: [Full-disclosure] The World's Largest Hacker Database

2013-01-08 Thread Justin C. Klein Keane
that were overlooked. Justin C. Klein Keane a.k.a. Mad Irish http://www.MadIrish.net The PGP signature on this email can be verified using the public key at http://www.madirish.net/gpgkey On 01/07/2013 10:36 AM, scryptz0 SOLDIERX wrote: Infosec Institute made a write up on the largest public hacker

[Full-disclosure] Drupal Custom Publishing Options Module XSS

2012-08-15 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Vulnerability Report Reported: January 3, 2012 Author: Justin C. Klein Keane jus...@madirish.net Description of Vulnerability: - - Drupal (http://drupal.org) is a robust content management system (CMS) written in PHP

Re: [Full-disclosure] Windows XP denial of service 0day found in CTF exercise

2012-04-17 Thread Justin C. Klein Keane
? Justin C. Klein Keane http://www.MadIrish.net The PGP signature on this email can be verified using the public key at http://www.madirish.net/gpgkey On 04/17/2012 02:48 AM, Adam Behnke wrote: Immunity Debugger Remote Denial of Service 0Day Tested against version 1.76 and 1.80 on Windows XP

Re: [Full-disclosure] [Security-news] SA-CONTRIB-2012-051 - Activity - Multiple Vulnerablities

2012-03-28 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Exploit for bespoke: * Install and enable the Activity and Flag modules * Add a new Flag with an arbitrary name at ?q=admin/build/flags/add * On the resulting page (?q=admin/build/flags/add/node/[name]) enter scriptalert('xss');/script for the flag

[Full-disclosure] NuralStorm Webmail Multiple Vulnerabilities

2010-07-12 Thread Justin C. Klein Keane
nearly 8 years ago so it is reasonable to assume that it has been abandoned. - -- Justin C. Klein Keane http://www.MadIrish.net The digital signature on this message can be confirmed using the public key at http://www.madirish.net/gpgkey -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.14 (GNU

[Full-disclosure] Drupal Views Module Information Disclosure Vulnerability

2010-07-02 Thread Justin C. Klein Keane
) { Vendor response: Vendor was notified April 2, 2010 of this issue. Three versions of Views have been released since. On July 1, 2010 Drupal security decided that the security team does not consider this a vulnerability. - -- Justin C. Klein Keane http://www.MadIrish.net The digital signature

[Full-disclosure] Drupal FileField Module XSS Vulnerability

2010-06-17 Thread Justin C. Klein Keane
is fully detailed in SA-CONTRIB-2010-066 (http://drupal.org/node/829808) - -- Justin C. Klein Keane http://www.MadIrish.net The digital signature on this message can be confirmed using the public key at http://www.madirish.net/gpgkey -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux

[Full-disclosure] Global Redirect 6.x-1.2 Arbitrary Redirection

2010-05-23 Thread Justin C. Klein Keane
, ':'); + $absolute = ($colonpos !== FALSE !preg_match('![/?#]!', substr($request, 0, $colonpos))); + if (!$absolute) { + drupal_goto($request, $query_string, NULL, 301); + } } } - -- Justin C. Klein Keane http

[Full-disclosure] Drupal Chaos Tools Suite (Ctools) Module Multiple Vulns

2010-05-20 Thread Justin C. Klein Keane
for authenticated users with the 'administer page manager' permission. Vendor response: - Upgrade to the latest version of Ctools. Ref http://drupal.org/node/803944, http://www.madirish.net/?article=458 - -- Justin C. Klein Keane http://www.MadIrish.net The digital signature

Re: [Full-disclosure] Drupal Context Module XSS

2010-05-11 Thread Justin C. Klein Keane
escalation via XSS vulnerabilities. If you're the only admin then it doesn't matter, but if any of the 30 editor accounts can be used to escalate to admin and write arbitrary PHP then you've got big problems. Justin C. Klein Keane http://www.MadIrish.net The digital signature on this message can

[Full-disclosure] Drupal Context Module XSS

2010-05-10 Thread Justin C. Klein Keane
to the module maintainer via the public issue queue at the direction of Drupal security. - -- Justin C. Klein Keane http://www.MadIrish.net The digital signature on this message can be confirmed using the public key at http://www.madirish.net/gpgkey -BEGIN PGP SIGNATURE- Version: GnuPG

Re: [Full-disclosure] WTF eEye Really?

2010-05-04 Thread Justin C. Klein Keane
back to 1641. Justin C. Klein Keane http://www.MadIrish.net The digital signature on this message can be confirmed using the public key at http://www.madirish.net/gpgkey On 05/04/2010 01:32 PM, Marsh Ray wrote: On 5/3/2010 7:44 PM, Sec News wrote: Did anyone else see this? http

[Full-disclosure] TaskFreak 0.6.2 SQL Injection Vulnerability

2010-04-29 Thread Justin C. Klein Keane
of concept: any user can log into TaskFreak as the administrator simply by using the username 1' or 1='1 Vendor response: - Upgrade to the latest version of TaskFreak. - -- Justin C. Klein Keane http://www.MadIrish.net The digital signature on this message can be confirmed using

Re: [Full-disclosure] Off Topic: Information Security research paper help

2010-04-29 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Successful troll is successful. -anon Or perhaps successful successful enumeration of infosec professionals susceptible to Apple 0-day will be successful? Or perhaps someone is just looking for a date? The inferences are limitless. Justin C. Klein

[Full-disclosure] XSS in Drupal Better Formats Module

2010-04-27 Thread Justin C. Klein Keane
', - -'#title' = $format-name, +'#title' = check_plain($format-name), '#default_value' = $default, '#return_value' = $format-format, '#parents' = $parents, - -- Justin C. Klein Keane http://www.MadIrish.net The digital signature on this message can

Re: [Full-disclosure] XSS in Drupal Better Formats Module

2010-04-27 Thread Justin C. Klein Keane
information or clarification would be greatly appreciated. Justin C. Klein Keane http://www.MadIrish.net The digital signature on this message can be confirmed using the public key at http://www.madirish.net/gpgkey On 04/27/2010 01:09 PM, Henri Salo wrote: On Tue, 27 Apr 2010 12:07:17 -0400

[Full-disclosure] Drupal 6.15 (core) Profile Module XSS Vulnerability

2010-03-03 Thread Justin C. Klein Keane
_profile_form_explanation($fiel $output .= ' '. t('The content of this field is kept private and will not be shown publicly.'); } - - return $output; + return check_plain($output); } function profile_form_profile($edit, $user, $category, $register = FALSE) { - -- Justin C. Klein Keane

Re: [Full-disclosure] ACM.ORG data leak still there 4 days after announcing to CEO John White

2010-02-22 Thread Justin C. Klein Keane
personal information doesn't seem to fit under any of the statutory definitions of crime unless you use that information to commit identity theft. The word intent figures prominently in that statute, so I'd surmise full-disclosure actually argues against this access being a crime. Justin C. Klein

Re: [Full-disclosure] ACM.ORG data leak still there 4 days after announcing to CEO John White

2010-02-22 Thread Justin C. Klein Keane
places (http://www.law.cornell.edu/uscode/18/1030.html), it's worth checking out. One more time for emphasis - I'm not a lawyer ;) - -- Justin C. Klein Keane http://www.MadIrish.net The digital signature on this message can be confirmed using the public key at http://www.madirish.net/gpgkey On 02

[Full-disclosure] Drupal Help Injection Module XSS Vulnerability

2010-02-17 Thread Justin C. Klein Keane
and log in as a user with privileges to 'inject help' 15. Click on any of the Help Inject icons (the little plus in a gray circle) 16. Click the 'Next' button on the 'path granularity' screen 17. Observe the JavaScript alert. - -- Justin C. Klein Keane http://www.MadIrish.net The digital

[Full-disclosure] Drupal Twitter Module Credential Exposure

2010-02-15 Thread Justin C. Klein Keane
credentials it utilizes base 64 encoded, but unencrypted connections, to pass credentials and update status messages rather than the OAuth facility provided by Twitter (http://apiwiki.twitter.com/OAuth-FAQ). - -- Justin C. Klein Keane http://www.MadIrish.net -BEGIN PGP SIGNATURE- Version

[Full-disclosure] dotProject 2.1.3 Multiple Vulnerabilities

2010-01-07 Thread Justin C. Klein Keane
in includes/main_functions.php) that could possibly be used to quickly develop a patch for many of the bespoke vulnerabilities. Vendor Response - --- These issues have been fixed in the git repository and should be resolved in the next release of dotProject. - -- Justin C. Klein

[Full-disclosure] Magento eCommerce Multiple XSS Vulnerabilities

2010-01-04 Thread Justin C. Klein Keane
extreme care is taken by developers. - -- Justin C. Klein Keane http://www.MadIrish.net -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/ iPwEAQECAAYFAktCFkIACgkQkSlsbLsN1gAvpQb/VH2krfCKertSsXhFANajrmcL

[Full-disclosure] Drupal Sections Module XSS Vulnerability

2009-12-16 Thread Justin C. Klein Keane
']); $form['sections'][$id]['weight']['#attributes']['class'] = 'sections-order-weight'; $rows[] = array( 'data' = array( Vendor Response - --- Upgrade to the latest version. SA-CONTRIB-2009-112 http://drupal.org/node/661404 - -- Justin C. Klein Keane http://www.MadIrish.net

[Full-disclosure] Drupal Embedded Media Field Module Multiple XSS

2009-05-28 Thread Justin C. Klein Keane
content' link then the 'Story' link 12. Observe multiple JavaScript alerts - -- Justin C. Klein Keane http://www.MadIrish.net http://www.LAMPSecurity.org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

[Full-disclosure] Drupal 6 CCK Module XSS Vulnerability

2009-05-18 Thread Justin C. Klein Keane
for the Body field label 9. Click 'Save content type' 10. Click Administer - Content Management - Content types 11. Click manage fields link for the type selected in #4 above 12. Observe two JavaScript alerts - -- Justin C. Klein Keane http://www.MadIrish.net http://www.LAMPSecurity.org -BEGIN PGP

[Full-disclosure] MagpieRSS Multiple XSS Vulnerabilities

2009-05-08 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -= MagpieRSS Multiple XSS Vulnerabilities =- May 6, 2009 Author: Justin C. Klein Keane jus...@madirish.net Software: MagpieRSS (http://magpierss.sourceforge.net/) Version Tested: magpierss-0.72 Vendor notified Full details can also be found

[Full-disclosure] Drupal 5.17 Taxonomy Module XSS Vulnerability

2009-05-08 Thread Justin C. Klein Keane
creators, who are likely to have elevated privileges in Drupal. Extreme care should be given to those users granted the 'administer taxonomy' privilege until a fix is available. - -- Justin C. Klein Keane http://www.MadIrish.net http://www.LAMPSecurity.org -BEGIN PGP SIGNATURE- Version

[Full-disclosure] NanoCMS Multiple Vulnerabilities

2009-04-13 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Security Evaluation of NanoCMS April 14, 2009 Version tested: 0.4_final by Justin C. Klein Keane jus...@madirish.net The text of this report is also available at http://www.madirish.net/vulnerabilities/nanocms NanoCMS (http://nanocms.in) is a PHP

[Full-disclosure] Frog CMS Multiple Vulnerabilities

2009-03-26 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Security Evaluation of Frog CMS Version tested: 0.9.4 by Justin C. Klein Keane jus...@madirish.net This advisory is also posted at http://www.madirish.net/vulnerabilities/frog-cms Frog CMS (http://www.madebyfrog.com/) is a lightweight content

[Full-disclosure] Drupal Admin Password Reset via XSS

2009-03-05 Thread Justin C. Klein Keane
of this advisory is also available at http://lampsecurity.org/drupal-xss-password-reset - -- Justin C. Klein Keane http://www.MadIrish.net http://www.LAMPSecurity.org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

[Full-disclosure] Drupal Protected Node Module XSS Vulnerability

2009-02-27 Thread Justin C. Klein Keane
security (http://drupal.org/security) team and module maintainer have been notified. - -- Justin C. Klein Keane http://www.MadIrish.net http://www.LAMPSecurity.org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

[Full-disclosure] Drupal Viewfield Module XSS Vulnerability

2009-02-26 Thread Justin C. Klein Keane
for the View field OR click Create content and then choose the content type you created in the previous steps to trigger the JavaScript. - -- Justin C. Klein Keane http://www.MadIrish.net http://www.LAMPSecurity.org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG

[Full-disclosure] Drupal Taxonomy Theme Module XSS Vulnerability

2009-02-26 Thread Justin C. Klein Keane
-$data['key']]['title'] = array('#value' = check_plain($item-name)); - -- Justin C. Klein Keane http://www.MadIrish.net http://www.LAMPSecurity.org -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

[Full-disclosure] pPIM Multiple Vulnerabilities

2009-02-24 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -= pPIM Multiple Vulnerabilities =- Version Tested: pPIM 1.0 Vendor notified Full details can also be found at http://www.lampsecurity.org/node/18 Author: Justin C. Klein Keane jus...@madirish.net Description pPIM (http://www.phlatline.org

[Full-disclosure] PHP-Calendar SQL Credential Disclosure

2009-02-06 Thread Justin C. Klein Keane
(AUTHORS, COPYING, FAQ, INSTALL, NEWS, README, UPDATE) should remedy this vulnerability. Unfortunately instructions about the removal of these files is not included in the installation guide or the automated install scripts. - -- Justin C. Klein Keane http://www.MadIrish.net -BEGIN PGP

[Full-disclosure] Drupal Imagefield Module Multiple Vulnerabilities

2009-01-29 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Drupal Imagefield Module Multiple Vulnerabilities Security Risk: High Exploitable: Remotely Vulnerabilities: Arbitrary File Upload, Cross Site Scripting Discovered by: Justin C. Klein Keane, Andrew Rosborough Tested: Imagefield 5.x-2.2 on Drupal

Re: [Full-disclosure] Drupal Imagefield Module Multiple Vulnerabilities

2009-01-29 Thread Justin C. Klein Keane
in the content type. The flaw allows such a user to upload any number of files, opening avenues to trigger local file inclusion vulnerabilities, hosting malware, phishing, etc., etc. The route to exploitation might be oblique, but ideally it shouldn't exist at all. Justin C. Klein Keane http

[Full-disclosure] Drupal Brilliant Gallery module SQL injection vulnerability

2008-09-24 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 * Discovery Date: Sept 17, 2008 * Security risk: high * Exploitable from: Remote * Vulnerability: SQL Injection * Discovered by: Justin C. Klein Keane (a.k.a. Mad Irish) Description Drupal (http://drupal.org) is a robust content management system