[Full-disclosure] Remote Command Injection in Arabic Prawn 0.0.1 Ruby Gem

2014-03-12 Thread Larry W. Cashdollar
Title: Remote Command Injection in Arabic Prawn 0.0.1 Ruby Gem Author: Larry W. Cashdollar, @_larry0 Download Site: http://rubygems.org/gems/Arabic-Prawn CVE: 2014-2322 Date: 12/17/2013 In Arabic-Prawn-0.0.1/lib/string_utf_support.rb, the following lines pass unsanitized input to the shell

[Full-disclosure] Persistent XSS in Media File Renamer V1.7.0 wordpress plugin

2014-02-23 Thread Larry W. Cashdollar
Title: Persistent XSS in Media File Renamer V1.7.0 wordpress plugin Date: 1/31/2014 Author: Larry W. Cashdollar, @_larry0 Vendor: Notified 2/4/2014 CVE: 2014-2040 Download: http://www.meow.fr/media-file-renamer/ Vulnerability: The following functions do not sanitize input before being echoed out

[Full-disclosure] Solaris Recommended Patch Cluster 6/19 local root on x86

2013-12-15 Thread Larry W. Cashdollar
Hi, I don't think I ever sent this to the list. Title: Solaris Recommended Patch Cluster 6/19 local root on x86 Date: 7/3/2013 Author: Larry W. Cashdollar, @_larry0 CVE: 2010-1183 If the system administrator is updating the system using update manager or smpatch (multi user mode) a local

[Full-disclosure] Bio Basespace SDK 0.1.7 Ruby Gem exposes API Key via command line

2013-12-14 Thread Larry W. Cashdollar
Title: Bio Basespace SDK 0.1.7 Ruby Gem exposes API Key via command line Date: 11/15/2013 Author: Larry W. Cashdollar, @_larry0 Download: http://rubygems.org/gems/bio-basespace-sdk Description: BaseSpace Ruby SDK is a Ruby based Software Development Kit to be used in the development of Apps

[Full-disclosure] Command injection in Ruby Gem Webbynode 1.0.5.3

2013-12-12 Thread Larry W. Cashdollar
Command injection in Ruby Gem Webbynode 1.0.5.3 Date: 11/11/2014 Author: Larry W. Cashdollar, @_larry0 Download: http://rubygems.org/gems/webbynode Vulnerability Description: The following code located in: ./webbynode-1.0.5.3/lib/webbynode/notify.rb doesn't fully sanitize user supplied

[Full-disclosure] Command injection vulnerability in Ruby Gem sprout 0.7.246

2013-12-02 Thread Larry W. Cashdollar
zip_dir, zip_name or output then they can possibly execute shell commands by injecting shell meta characters as input. PoC: For example: filename;id;.zip I contacted the developer a few weeks ago but received no response. Thanks! Larry W. Cashdollar @_larry0

[Full-disclosure] Unauthenticated Remote File Upload via HTTP for perl-Programming language 1.6 on iOS

2013-09-11 Thread Larry W. Cashdollar
TITLE: Unauthenticated Remote File Upload via HTTP for perl-Programming language 1.6 on iOSDate: 8/1/2013Author: Larry W. Cashdollar, @_larry0Download:https://itunes.apple.com/us/app/perl-programming-language/id578116006?mt=8ls=1http://www.tayutec.com/indexen.htmlDescription: "This is an ios

[Full-disclosure] Unauthenticated Remote File Upload via HTTP for lua-Programming language 1.6 on iOS

2013-09-10 Thread Larry W. Cashdollar
TITLE: Unauthenticated Remote File Upload via HTTP for lua-Programming language 1.6 on iOSDate: 8/1/2013Author: Larry W. Cashdollar, @_larry0Download:https://itunes.apple.com/us/app/lua-programming-language/id578116006?mt=8ls=1http://www.tayutec.com/indexen.htmlDescription: "Please dow

Re: [Full-disclosure] Unauthenticated Remote File Upload via HTTP for lua-Programming language 1.6 on iOS

2013-09-10 Thread Larry W. Cashdollar
On Sep 10, 2013, at 02:19 PM, "Larry W. Cashdollar" lar...@me.com wrote:https://itunes.apple.com/us/app/lua-programming-language/id578116006?mt=8ls=1Sorry that URL above is incorrect: https://itunes.apple.com/us/app/lua-programming-language/id505972

[Full-disclosure] Remote Command Injection in fog-dragonfly-0.8.2 Ruby Gem

2013-09-02 Thread Larry W. Cashdollar
TITLE:Remote Command Injection in fog-dragonfly-0.8.2 Ruby GemCredit: Larry W. Cashdollar, @_larry0Date: 8/16/2013CVE: 2013-5671Download: https://rubygems.org/gems/fog-dragonflyDescription:"Dragonfly is an on-the-fly Rack-based image handling framework. It is suitable for use with Rails, Si

[Full-disclosure] Rgpg 0.2.2 Ruby Gem Remote Command Injection

2013-08-03 Thread Larry W. Cashdollar
Title:Rgpg 0.2.2 Ruby Gem Remote Command InjectionDate: 7/31/2013Advisory Author: Larry W. Cashdollar, @_larry0CVE: CVE-2013-4203Download: https://rubygems.org/gems/rgpgDescription:"A simple Ruby wrapper around gpg command for file encryption.rgpg is a simple API for interacting with the gpg

[Full-disclosure] Show In Browser 0.0.3 Ruby Gem /tmp file injection vulnerability

2013-05-23 Thread Larry W. Cashdollar
TITLE: Show In Browser 0.0.3 Ruby Gem /tmp file injection vulnerability. DATE: 5/15/2023 AUTHOR: Larry W. Cashdollar (@_larry0) DOWNLOAD: https://rubygems.org/gems/show_in_browser DESCRIPTION: Opens arbitrary text in your browser VENDOR: Jonathan Leung FIX: N/A CVE: 2013-2105 DETAILS

[Full-disclosure] Remote command Injection in Creme Fraiche 0.6 Ruby Gem

2013-05-14 Thread Larry W. Cashdollar
TITLE: Remote command Injection in Creme Fraiche 0.6 Ruby Gem DATE: 5/14/2013 AUTHOR: Larry W. Cashdollar (@_larry0) DOWNLOAD: http://rubygems.org/gems/cremefraiche, http://www.uplawski.eu/technology/cremefraiche/ DESCRIPTION: Converts Email to PDF files. VENDOR: Notifed on 5/13/2013

[Full-disclosure] Remote command injection md2pdf ruby gem

2013-04-15 Thread Larry W. Cashdollar
arry) groups=1000(larry),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),116(lpadmin),117(sambashare) Linux underfl0w 3.2.0-39-virtual #62-Ubuntu SMP Wed Feb 27 22:45:45 UTC 2013 i686 athlon i386 GNU/Linux = nil http://vapid.dhs.org/advisories/md2pdf-remote-exec.htmlThis vulnerability has been a

[Full-disclosure] Remote command injection in Ruby Gem kelredd-pruview 0.3.8

2013-04-11 Thread Larry W. Cashdollar
Remote command injection in Ruby Gem kelredd-pruview 0.3.8 Larry W. Cashdollar 4/4/2013 @_larry0 Description: "A gem to ease generating image previews (thumbnails) of various files." https://rubygems.org/gems/kelredd-pruview Remote commands can be executed if the file name contains

[Full-disclosure] Remote Command Injection Ruby Gem Karteek Docsplit 0.5.4

2013-04-09 Thread Larry W. Cashdollar
Remote Command Injection Ruby Gem Karteek Docsplit 0.5.4 4/1/2013 Larry W. Cashdollar @_larry0 User supplied input isn't sanitized against shell metacharacters and is fed directly to the shell. If the user is tricked into extracting a file with shell characters in the name code can

[Full-disclosure] Remote command execution in Ruby Gem ldoce 0.0.2

2013-04-01 Thread Larry W. Cashdollar
Remote command execution in Ruby Gem ldoce 0.0.2 Larry W. Cashdollar @_larry0 3/25/2013 Ldoce Ruby Gem: Easily interface with the Longman Dictionary of Contemporary English API from Ruby: NB currently mac only as it depends on the afplay command. https://rubygems.org/gems/ldoce https

[Full-disclosure] Ruby gem Thumbshooter 0.1.5 remote command execution

2013-03-26 Thread Larry W. Cashdollar
to the shell in the following code snippet from ./thumbshooter-0.1.5/lib/thumbshooter.rb lines:1012 command "xvfb-run -a --server-args='-screen 0, #{screen}x24' "1015 command "{WEBKIT2PNG} '{url}'{args}"1017 img = `{command} 21`Larry W. Cashdollar@_larry0http://vapid.dhs.org/adv

[Full-disclosure] Ruby gem fastreader-1.0.8 remote code exec

2013-03-12 Thread Larry W. Cashdollar
/entry_controller.rb .strip only removes whitespace before and after the URL. 115 # open web browser 116 command = (ENV['FASTREADER_WEB'] || "open") + " {@current_entry.url.strip}" 117 `{command}` Larry W. Cashdollar @_larry0

[Full-disclosure] MiniMagic ruby gem remote code execution

2013-03-12 Thread Larry W. Cashdollar
The .strip will only remove whitespace from the beginning and end of the command. Larry W. Cashdollar @_larry0 http://vapid.dhs.org ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Curl Ruby Gem Remote command execution

2013-03-12 Thread Larry W. Cashdollar
if @debug 133 puts cmd.red 134 end 135 result = open_pipe(cmd) PoC: page = curl.get("http://vapid.dhs.org/\"\;id\/tmp\/p\;\"") larry@underfl0w:/tmp$ cat p uid=0(root) gid=0(root) groups=0(root) Larry W.

Re: [Full-disclosure] Oracle Auto Service Request /tmp file clobbering vulnerability

2013-03-07 Thread Larry W. Cashdollar
Hello Everyone,Just an update that Oracle has released a fix for the vulnerabilities in these two packages and if you're using them you should use the new versions.Oracle ASR Manager 4.3.2: Patch 16431755Oracle Automated Service Manager (OASM) 1.4.1: Patch 16426687ThanksLarry

[Full-disclosure] OpenFabrics ibutils 1.5.7 /tmp clobbering vulnerability

2013-03-06 Thread Larry W. Cashdollar
OpenFabrics ibutils 1.5.7 /tmp clobbering vulnerability 3/6/2013 Larry W. Cashdollar @_larry0 The infiniband diagnostic utiltiy handles files in /tmp insecurely. A malicious user can clobber root owned files with common symlink attacks. http://www.openfabrics.org/downloads/ibutils/ [nobody

Re: [Full-disclosure] rpi-update tmpfile vulnerability

2013-03-05 Thread Larry W. Cashdollar
Hello everyone,I took a closer look at this vulnerability here is my exploit to share:45 cat /tmp/updateScript.sh EOF -- if we own it first, wait for I_MODIFY and inject our malicious code46 #!/bin/bash47 if mv "${_tempFileName}" "$0"; then48 rm -- "\$0"49 exec env UPDATE_SELF=0 /bin/bash "$0"

[Full-disclosure] Ruby Gem Flash Tool 0.6.0 Remote code execution vulnerability

2013-03-03 Thread Larry W. Cashdollar
Flash Tool 0.6.0 Remote code execution vulnerability3/1/2013http://rubygems.org/gems/flash_toolhttps://github.com/milboj/flash_toolIf files downloaded contain shell characters it's possible to execute code as the client user. ie: flash_file;id/tmp/o;.swf ./flash_tool-0.6.0/lib/flash_tool.rb

[Full-disclosure] Remote command execution for Ruby Gem ftpd-0.2.1

2013-03-02 Thread Larry W. Cashdollar
'21', 217 ].compact.join(' ') 218 if File.exists?(dirname) 219 list = Dir.chdir(dirname) do 220 `{command}`This vulnerability has been fixed by the author in the latest release. Larry W. Cashdollar @_larry0 http://otiose.dhs.org/ __

[Full-disclosure] Fileutils ruby gem possible remote command execution and insecure file handling in /tmp

2013-02-28 Thread Larry W. Cashdollar
Fileutils ruby gem possible remote command execution and insecure file handling in /tmp2/23/2013Hi list, I was looking at some gem files and noticed a few issues with fileutils-0.7http://rubygems.org/gems/fileutils"A set of utility classes to extract meta data from different file types".Handles

[Full-disclosure] Oracle Auto Service Request /tmp file clobbering vulnerability

2013-02-28 Thread Larry W. Cashdollar
Oracle Auto Service Request /tmp file clobbering vulnerability http://www.oracle.com/us/support/systems/premier/auto-service-request-155415.html http://docs.oracle.com/cd/E18476_01/doc.220/e18478/asr.htm I noticed it creates files insecurely in /tmp using time stamps instead of mkstemp(). You

[Full-disclosure] Gambas 3.3.4 Directory hijack vulnerability

2013-02-27 Thread Larry W. Cashdollar
Gambas 3.3.4 Directory hijack vulnerabilityThe gambas software package creates a directory in tmp to work from without verifying another user hasn't already created it. This allows a local user to hijack ownership. This advisory was takenfrom the bug filed with the developers.Describe the

[Full-disclosure] Oracle Automated Service Manager 1.3 Auto Service Request 4.3 local root during install

2013-01-31 Thread Larry W. Cashdollar
Oracle Automated Service Manager 1.3 local root during install Larry W. Cashdollar 1/29/2013 @_larry0 SUNWsasm-1.3.1-20110815093723 https://updates.oracle.com/Orion/Services/download?type=readmearu=15864534 From the README: "O

Re: [Full-disclosure] Local root exploit for Centrify Deployment Manager v2.1.0.283 local root

2013-01-04 Thread Larry W. Cashdollar
at 3:49 PM, Larry W. Cashdollar lar...@me.com wrote: /*Local root exploit for Centrify Deployment Manager v2.1.0.283 local root, Centrify released a fix very quickly - nice vendor response. http://vapid.dhs.org/exploits/centrify_local_r00t.c CVE-2012-6348 12/17/2012 http://vapid.dhs.org

Re: [Full-disclosure] Local root exploit for Centrify Deployment Manager v2.1.0.283 local root

2012-12-18 Thread Larry W. Cashdollar
:) On Tue, Dec 18, 2012 at 3:49 PM, Larry W. Cashdollar lar...@me.com wrote: /*Local root exploit for Centrify Deployment Manager v2.1.0.283 local root, Centrify released a fix very quickly - nice vendor response. http://vapid.dhs.org/exploits/centrify_local_r00t.c CVE-2012-6348 12/17/2012 http

Re: [Full-disclosure] Sunny WebBox Default Password

2011-12-24 Thread Larry W. Cashdollar
I like in the description of the product, "The Sunny WebBox is a multi-functional, energy-efficient data logger which offers a wealth of options for displaying, archiving and processing data, even in networks with strict security regulations."

Re: [Full-disclosure] Mobile Prank Hacktool

2011-12-23 Thread Larry W. Cashdollar
Looks like the link is unavailable.-- Larry C$On Dec 19, 2011, at 11:49 AM, Hacxx Under hacx...@gmail.com wrote:This is a tool that enable anyone to prank mobiles and land phones in portugal. You can choose calls or sms's. http://www.megaupload.com/?d=GKWWWMSY [Share the link, not the content]

Re: [Full-disclosure] one of my servers has been compromized

2011-12-05 Thread Larry W. Cashdollar
Hi,I'd say tell your boss your application has been compromised right away. Tell them you'll need to rebuild the entire system from scratch and they'll need to either devise an upgrade path for virtuemart or find a new ecommerce solution.You can't trust a system once it has been compromised. --

Re: [Full-disclosure] one of my servers has been compromized

2011-12-05 Thread Larry W. Cashdollar
I'd check these too:http://virtuemart.net/security-bulletinsOn Dec 05, 2011, at 05:35 AM, mitchell mitch...@csc.bg wrote:Hi,Here is what you generally need to do in such cases.1. Suspend the webapp until you investigate.2. Check the web server logs for unusual entries and identify the entry point.

Re: [Full-disclosure] US general: 'We're cleared to cyber-bomb enemy hackers'

2011-11-17 Thread Larry W. Cashdollar
Maybe they should ramp up their help first? http://www.wired.com/dangerroom/2011/11/darpa-hackers-cybersecurity/ US general: 'We're cleared to cyber-bomb enemy hackers' Curiously, his command website went down after he said it http://www.theregister.co.uk/2011/11/17/us_military_cyberspace/

Re: [Full-disclosure] Ubuntu 11.10 now unsecure by default

2011-11-17 Thread Larry W. Cashdollar
Anyone know what the default is for Ubuntu 11 PermitEmptyPasswords no PasswordAuthentication no in /etc/ssh/sshd_config? On Thu, 17 Nov 2011 18:50:12 +0100, Mario Vilas said: The guest account has no password, but it's not possible to login remotely with ssh. Well.. out of the box,

Re: [Full-disclosure] Ubuntu 11.10 now unsecure by default

2011-11-17 Thread Larry W. Cashdollar
imap? creating folders? etc.. =/ Are there any other services this may effect? On Thu, Nov 17, 2011 at 7:18 PM, Andrew N Dowden andrew_dow...@softdesign.net.nz wrote: On 18/11/11 23:46, Larry W. Cashdollar wrote: Anyone know what the default is for Ubuntu 11 PermitEmptyPasswords

[Full-disclosure] bind dos info?

2011-11-16 Thread Larry W. Cashdollar
Hello list, I am wondering if anyone has more details on the bind9 DoS that just came out? (CVE-2011-4313) from what I can tell it appears a negative cached DNS object with a valid RR response associated with it(which shouldn't exist) will cause a vulnerabile bind9 server to crash. See lines 1890

Re: [Full-disclosure] bind dos info?

2011-11-16 Thread Larry W. Cashdollar
, Larry W. Cashdollar b...@fbi.dhs.org wrote: Hello list, I am wondering if anyone has more details on the bind9 DoS that just came out? (CVE-2011-4313) from what I can tell it appears a negative cached DNS object with a valid RR response associated with it(which shouldn't exist) will cause