[Full-disclosure] Administrivia: The End

2014-03-19 Thread John Cartwright
Hi When Len and I created the Full-Disclosure list way back in July 2002, we knew that we'd have our fair share of legal troubles along the way. We were right. To date we've had all sorts of requests to delete things, requests not to delete things, and a variety of legal threats

[Full-disclosure] USSD Sender Hacktool 1.0

2014-03-19 Thread AWeber Test
the text and a OK button. If it get's undelivered an actual sms will be send. Screen Shot: http://i492.photobucket.com/albums/rr287/tribalmp/USSDSenderHacktool.jpg Download: http://www.firedrive.com/file/C961587BD8BCD4C9___ Full-Disclosure - We be

Re: [Full-disclosure] [SPAM] [Bayesian][bayesTestMode] Re: Google vulnerabilities with PoC

2014-03-19 Thread Leutnant Steiner
0zsz7Eyv7Whu7UUB3zkn > lNEAnjuoLXknIuKXFrVQwhPFJmjLx6ln > =wWkp > -----END PGP SIGNATURE- > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored

[Full-disclosure] Kaspersky 14.0.0.4651 RegExp Remote Denial of Service PoC2

2014-03-19 Thread [CXSEC]
the risk of leakage of resources by the level of recursion. References: http://cxsecurity.com/issue/WLB-2014030108 Best regards, CXSEC TEAM http://cxsec.org/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-cha

[Full-disclosure] All your PLC are belong to us (2)

2014-03-18 Thread scadastrangelove
t of, but Authentication bypass (INSUFFICIENT ENTROPY/CVE-2014-2251) is the best. Links: http://scadastrangelove.blogspot.com/2014/03/all-your-plc-are-belong-to-us-2.html More details are pending. Regards, SCADA StrangeLove team ___ Full-Discl

Re: [Full-disclosure] Bank of the West security contact?

2014-03-18 Thread Jeffrey Walton
ern District of Florida approved an Order granting motion for final approval of a Class Action Settlement Agreement, and filed a motion for attorneys' fees and expenses, as well as for incentive awards. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Bank of the West security contact?

2014-03-18 Thread Florian Weimer
ould contact Fiserv. _______ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] McAfee Cloud SSO and McAfee Asset Manager vulns

2014-03-18 Thread Brandon Perry
n: keep-alive 35. Content-Type: application/x-www-form-urlencoded 36. Content-Length: 91 37. 38. fromDate=03-19-2014&toDate=03-19-2014&freetext=&Severity=0&AuditType=12&user=Administrator -- http://volatile-minds.blogspot.com -- blog http://www.volatile

[Full-disclosure] [Quantum Leap Advisory] #QLA140216 - VLC Reflected XSS vulnerability

2014-03-18 Thread Francesco Perna
ZHm+XFOviiiX2L/NNpedwnn6 Ax8y38AvQ8gFYvDtY+0tP4vBRrRAwzvGIZgSKdmeNMK+CpUvr+hZX53zVpTCPA== =sPV+ -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secu

[Full-disclosure] (CFP) LACSEC 2014: Cancun, Mexico. May 7-8, 2014 (EXTENDED DEADLINE)

2014-03-18 Thread Fernando Gont
Mya+zOLq2rYOusH0S0Wh/Ytgui6vpHLNUF2UQ9Wp+mf2Q7hLw1T 5HMYoT+BmPXazenOFcjXGxUAWudI7Pg+0DdEN+ErEK/YmaaUKd+xEYKpIuG9dSDe c7C5mlJEpi47ulyyGkH8djpdvQ9rJ/9HEpVzzTs/YGwYhThxKAa8dxRxCrzIY+pQ qapI3+dGc58c7o3EjHL2 =VBtR -END PGP SIGNATURE- ___ Full-Disc

[Full-disclosure] CEbot: disasm from your Twitter account

2014-03-18 Thread Capstone Engine
ls, see http://capstone-engine.org/bot.html This is mainly for fun, but hopefully it can be useful for those who are on Twitter all the time :-) Any suggestions, let us know. Cheers, Capstone Engine _______ Full-Disclosure - We believe in it. Charter: http:/

Re: [Full-disclosure] [SPAM] [Bayesian][bayesTestMode] Re: Google vulnerabilities with PoC

2014-03-18 Thread The Doctor
nderbird - http://www.enigmail.net/ iEYEAREKAAYFAlMnUIoACgkQO9j/K4B7F8H9qACg206K0zsz7Eyv7Whu7UUB3zkn lNEAnjuoLXknIuKXFrVQwhPFJmjLx6ln =wWkp -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-di

[Full-disclosure] Emergency patch for ShadowIRCd versions 6.3+ and Elemental-IRCd 6.5+

2014-03-18 Thread Sam Dodrill
patch does disable this functionality, but in this case the inconvenience is worth the security. Thanks for reading, and I hope you enjoyed this report. I've been wanting to make a report to this mailing list for a while now and was hoping it would not be on one of my own projects, bu

[Full-disclosure] [SECURITY] [DSA 2880-1] python2.7 security update

2014-03-17 Thread Moritz Muehlenhoff
- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Garage4Hackers Ranchoddas Series - Part 2 on Reverse Engineering - Free Webinar

2014-03-17 Thread Sandeep Kamble
sic knowledge of how the CPU and operating systems work > > Kind Regard, > Garage4Hackers Team > Http://garage4hackers.com > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ MDVSA-2014:064 ] udisks

2014-03-17 Thread security
- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ MDVSA-2014:063 ] x2goserver

2014-03-17 Thread security
-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Bank of the West security contact?

2014-03-17 Thread Jeffrey Walton
ndaq.com/unitedstates/x/294324/Data+Protection+Privacy/Once+Again+Clapper+Defeats+Data+Breach+Class+Action ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Bank of the West security contact?

2014-03-17 Thread Kristian Erik Hermansen
istianHermansen ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Garage4Hackers Ranchoddas Series - Part 2 on Reverse Engineering - Free Webinar

2014-03-17 Thread Sandeep Kamble
- basic knowledge of how the CPU and operating systems work > > Kind Regard, > Garage4Hackers Team > Http://garage4hackers.com > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Mario Vilas
arate military and the police: one fights the enemy of the state, the other serves and protects the people. When the military becomes both, then the enemies of the state tend to become the people.” _______ Full-Disclosure - We believe in it. Charter: http://l

[Full-disclosure] [ MDVSA-2014:062 ] webmin

2014-03-17 Thread security
-BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFTJuP1mqjQ0CJFipgRAhC+AJ9DRGJv63JJDYj1aOq2dGQ4gYtsJwCgl4VQ E51kan9dXAlHxnPVzflibaY= =MQUx -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Ulisses Montenegro
son we separate military and the police: one fights > the enemy of the state, the other serves and protects the people. When > the military becomes both, then the enemies of the state tend to become the > people.” > > ___ > Full-Disclos

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Pedro Ribeiro
ced it: http://marc.info/?l=full-disclosure&m=139076233105401&w=2 > > 2014-03-17 10:24 GMT+01:00 Pedro Ribeiro : > > > > On 16 Mar 2014 23:36, "T Imbrahim" wrote: > >> > >> The thread read Google vulnerabilities with PoC. From my understanding i

[Full-disclosure] Few Hrs left Webcast Reminder: Garage4Hackers Ranchoddas Series 2 on Reverse Engineering

2014-03-17 Thread Sandeep Kamble
istance with webcast , please contact sand...@garage4hackers.com Kind Regards, Garage4Hackers http://garage4hackers.com https://www.facebook.com/pages/Garage4Hackers/138904662794635 https://twitter.com/garage4hackers _______ Full-Disclosure - We believe in it. Charter

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Mario Vilas
es of the state tend to become the people.” _______ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Źmicier Januszkiewicz
with exactly the same text. > > This is turning into a madhouse... I hope this guy doesn't have access to a > gun. > > Regards > Pedro > > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclo

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread T Imbrahim
xean Koret To: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC Date: Mon, 17 Mar 2014 12:27:27 +0100 Hi, The only probable way of exploiting it I can see would be if the servers at Google where the files are uploaded would perform some specific tasks

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Joxean Koret
ure.asc Description: This is a digitally signed message part ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Gichuki John Chuksjonia
>> is true in security I support. Why you would Google my name ... ? >> >> Is the English language causing you ill effects? >> >> --- ped...@gmail.com wrote: >> >> From: Pedro Ribeiro >> To: timbra...@techemail.com >> Cc: full-disclosure@lis

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread T Imbrahim
hat is true in security I support. Why you would Google my name ... ?   Is the English language causing you ill effects? --- ped...@gmail.com wrote:From: Pedro Ribeiro To: timbra...@techemail.comCc: full-disclosure@lists.grok.org.uk, Michal Zalewski , mvi...@gmail.com, gynv...@coldwind.plSubject:

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Mario Vilas
From: Pedro Ribeiro > To: timbra...@techemail.com > Cc: full-disclosure@lists.grok.org.uk, Michal Zalewski < > lcam...@coredump.cx>, mvi...@gmail.com, gynv...@coldwind.pl > > Subject: Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC > Date: Mon, 17 Mar 2014 09:24:08

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Mario Vilas
urity matters. > > --- lcam...@coredump.cx wrote: > > From: Michal Zalewski > To: timbra...@techemail.com > Cc: pr...@yahoo.co.uk, full-disclosure > Subject: Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC > Date: Sat, 15 Mar 2014 10:59:40 -0700 > > > A

[Full-disclosure] [CVE-2014-2339] GNUboard SQL Injection Vulnerability

2014-03-17 Thread claepo.wang
ber['mb_id']);    }}?>==POC && EXP==1. Login as a member2. GET http://target/bbs/ajax.autosave.php?content=1&subject=1[inj_exp]  {exp can be found on my server: http://pandas.pw/gnuboard.exp}    3. Page returns 1062 : D

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Pedro Ribeiro
he same text. This is turning into a madhouse... I hope this guy doesn't have access to a gun. Regards Pedro ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [SPAM] [Bayesian][bayesTestMode] Re: Google vulnerabilities with PoC

2014-03-16 Thread Exibar
LOL. boy oh boy you would have HATED the N3td3v years then... I'm sure your delete key works doesn't it? From: Full-Disclosure [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Thomas Williams Sent: Saturday, March 15, 2014 10:44 AM To: Mario Vilas Cc: full-

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-16 Thread T Imbrahim
ating security that way, there are other parties like NSA who welcome them happily. --- lcam...@coredump.cx wrote: From: Michal Zalewski To: timbra...@techemail.com Cc: M Kirschbaum , full-disclosure Subject: Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC Date: Sat, 15 Mar 2014 11:

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-16 Thread T Imbrahim
rket or to some government. The NSA maybe is happy to buy a RFI on Google, im sure they could make good use of that. Google is very deceptive in security matters. --- lcam...@coredump.cx wrote: From: Michal Zalewski To: timbra...@techemail.com Cc: pr...@yahoo.co.uk, full-disclosure Subject:

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-16 Thread T Imbrahim
y if js execution it different for two different sites. Sincerely , T. Imbrahim --- lcam...@coredump.cx wrote: From: Michal Zalewski To: M Kirschbaum Cc: "full-disclosure@lists.grok.org.uk" Subject: Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC Date: Sat, 15 Mar 2014 09:46

Re: [Full-disclosure] [SPAM] [Bayesian][bayesTestMode] Re: Google vulnerabilities with PoC

2014-03-16 Thread Thomas Williams
e. I'm looking forward to seeing the RCE exploits (be it > client or server side). > > Kind regards, > Gynvael Coldwind > > > > > > -- > “There's a reason we separate military and the police: one fights the enemy > of the state, the other serves

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-16 Thread T Imbrahim
 Definetely a security problem.  http://resources.infosecinstitute.com/file-upload-vulnerabilities/ Are you a Techie? Get Your Free Tech Email Address Now! Visit http://www.TechEmail.com_______ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.u

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-16 Thread M Kirschbaum
either experience, nor job title, proves exploitability of a *potential* bug. Working exploits do. That's it from me. I'm looking forward to seeing the RCE exploits (be it client or server side). Kind regards, Gynvael Coldwind_______

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-16 Thread Alfred Beese
_ Get your free email @ http://www.xtcmail.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] exploit for old rlpdaemon bug

2014-03-16 Thread Nomen Nescio
INET->new( Proto=> "tcp", PeerAddr => "localhost", PeerPort => $PORT ) or die "cannot connect to port $PORT at localhost"; # RFC1179 printf($remote "%clp\n", 2); # rlpdaemon should log this close($remote); exit(0); ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] XSS Vulnerability in the Youtube Gallery 3.4.0 Component

2014-03-16 Thread Mahmoud Ghorbanzadeh
script or HTML via the videofile parameter to /includes/flvthumbnail.php. POC: http://SiteAddress/joomla/components/com_youtubegallery/includes/flvthumbnail.php?videofile=alert('XSS')___ Full-Disclosure - We believe in it. Cha

Re: [Full-disclosure] [SPAM] [Bayesian][bayesTestMode] Re: Google vulnerabilities with PoC

2014-03-15 Thread Stefan Jon Silverman
and shut up. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread Gichuki John Chuksjonia
; On Thu, Mar 13, 2014 at 10:43:50AM +, Nicholas Lemonias. wrote: >> Google vulnerabilities uncovered... >> >> >> http://news.softpedia.com/news/Expert-Finds-File-Upload-Vulnerability-in-YouTube-Google-Denies-It-s-a-Security-Issue-431489.shtml > >> ___

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread Georgi Guninski
in-YouTube-Google-Denies-It-s-a-Security-Issue-431489.shtml > _______ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ ___

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Michal Zalewski
and I don't think they are met here), but if my understanding is wrong, I'd really like to learn about the proposed attack. /mz ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Michal Zalewski
unfortunate that the thread has devolved into various accusations and credential-slinging, because it reduces the likelihood of such a productive outcome. Please feel free to ping me directly any time, though - I'm happy to chat. Cheers, /mz _____

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Michal Zalewski
et.) JSONP is a different animal. /mz _______ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Michal Zalewski
appears in a block of code. Last but not least, the final piece of the puzzle is that the response must be served at a URL that can be guessed by third parties who don't have access to your account. /mz _______ Full-Disclosure - We believe in it.

Re: [Full-disclosure] [SPAM] [Bayesian][bayesTestMode] Re: Google vulnerabilities with PoC

2014-03-15 Thread Mario Vilas
ience, nor job title, proves >> exploitability of a *potential* bug. Working exploits do. >> >> >> That's it from me. I'm looking forward to seeing the RCE exploits (be it >> client or server side). >> >> Kind regards, >> Gynvael Coldwind >> >> >> > > > -- > “

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread Mario Vilas
ind regards, > Gynvael Coldwind > > > -- “There's a reason we separate military and the police: one fights the enemy of the state, the other serves and protects the people. When the military becomes both, then the enemies of the state tend to become the people.” ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread Mario Vilas
the enemy of the state, the other serves and protects the people. When the military becomes both, then the enemies of the state tend to become the people.” ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread Gynvael Coldwind
exploitability of a *potential* bug. Working exploits do. That's it from me. I'm looking forward to seeing the RCE exploits (be it client or server side). Kind regards, Gynvael Coldwind _______ Full-Disclosure - We believe in it. Charter: http://l

[Full-disclosure] Reflected XSS Attacks XSS vulnerabilities in Webmin 1.670 (CVE-2014-0339)

2014-03-15 Thread William Costa
e application and can be modified by the user, before making any kind of transaction with them must be validated. VIII. References - http://www.kb.cert.org/vuls/id/381692 http://www.webmin.com/changes.html ___ Full-Disclosu

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread M Kirschbaum
threats by name and bank details. >  >Rgds, >M. Kirschbaum >  >___ >Full-Disclosure - We believe in it. >Charter: http://lists.grok.org.uk/full-disclosure-charter.html >Hosted and sponsored by Secunia - http://secunia.com/ > -- “There's a reason we separate military a

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Alfred Beese
://www.xtcmail.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [CVE-2013-5954] Multiple Cross Site Request Forgery Vulnerabilities in OpenX 2.8.11

2014-03-15 Thread Mahmoud Ghorbanzadeh
regards. OpenX CSRF Vulnerabilities Report.docx Description: application/vnd.openxmlformats-officedocument.wordprocessingml.document ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread antisnatchor
hat Google >> does not want to pay. And I bet any amount of money that the bug bounty >> program is a way for filing potential threats by name and bank details. >> >> Rgds, >> M. Kirschbaum >> >> >> __

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread Mario Vilas
otential threats by name and bank details. > > Rgds, > M. Kirschbaum > > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > -- “There'

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Mario Vilas
ecute some of >>> the uploaded files (Social Engineering). >>> >> >> Come on, seriously? Social Engineering can make him download this file >> from pastebin just as well. That's a real stretch. >> >> IMHO it is not a security issue. You're upl

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Mario Vilas
th, then the enemies of the state tend to become the people.” ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread M Kirschbaum
for filing potential threats by name and bank details.   Rgds, M. Kirschbaum ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread antisnatchor
gt;>> Can't you see that the advisory is about writing arbitrary files. If I >>> was your boss I would fire you. >>> -- Forwarded message -- >>> From: Nicholas Lemonias. >>> Date: Fri, Mar 14, 2014 at 5:43 PM >>> Subject:

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread David H
ne, pal. >>> ;) >>> >>> >>> On Fri, Mar 14, 2014 at 6:44 PM, Nicholas Lemonias. < >>> lem.niko...@googlemail.com> wrote: >>> >>>> >>>> People can read the report if they like. Can't you even do basic things >>

Re: [Full-disclosure] Full-Disclosure Digest, Vol 109, Issue 32

2014-03-15 Thread ChienD
For the n00b guy in the room, Great post Chris! Thanks for spelling it out clearly. > Message: 6 > Date: Fri, 14 Mar 2014 16:00:02 -0400 > From: Chris Thompson > To: lem.niko...@googlemail.com, full-disclosure@lists.grok.org.uk > Subject: Re: [Full-disclosure] Fwd: Google vulne

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Brian M. Waters
b02pve5i7in6OoYBQj4m85KVzq+Pnvfowqo6VHzlLwfK3vaD4a 8sEm+i63N02VT6ItO9y7fCcv52pU0sjepGIoYV2aTHkIR3BaNmyxSEVaOZclDY37 6HFSdkWZP0rvkQefNY6QcUvMfBszxFfecQ5cGfIcbScx35iLChXQMYJpH9dmPao= =Ngjk -END PGP SIGNATURE- _______ Full-Disclosure - We believe in it. Charter: htt

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Colette Chamberland
t the advisory is about writing arbitrary files. If I was >>> your boss I would fire you. >>> -- Forwarded message -- >>> From: Nicholas Lemonias. >>> Date: Fri, Mar 14, 2014 at 5:43 PM >>> Subject: Re: [Full-disclosure] Google vulner

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread William Scott Lockwood III
nse from the >>>>>>>> API >>>>>>>> to say the file you uploaded has been received and saved. >>>>>>>> >>>>>>>> Now, as you no doubt know, when you upload a regular movie to >>>>>

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread Colette Chamberland
We have many PoC's including video clips. We may upload for the security >> world to see. >> >> However, this is not the way to treat security vulnerabilities. Attacking >> the researcher and bringing you friends to do aswell, won't mitigate the >

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread Michael Smith
issing contest empty their bladders elsewhere. Please! ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-15 Thread M Kirschbaum
believe that Google was false not to award this.___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Trixbox all versions , Remote root Exploit

2014-03-15 Thread 0u7 5m4r7
happy as pig in $hit xD Still need more?? you will notice that you're unable to reach this file due to the http firewall but actually there is simple and yet dirty trick that allow you to get pass through it , and execute your command smothely as boat on the river ;) And here come the challeng

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
gular movie to >>>>>>> YouTube, once uploaded it goes away and does some post-processing, >>>>>>> converting it to flash for example. What's to say that there isn't some >>>>>>> verification aspect to this post-processing that checks if the

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
but nevertheless only > processes those files as video - there is NO reason to suspect otherwise, > and I'd like to be proven wrong here. Proven as in PoC. > > > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Can't you see that the advisory is about writing arbitrary files. If I >>> was your boss I would fire you. >>> -- Forwarded message -- >>> From: Nicholas Lemonias. >>> Date: Fri, Mar 14, 2014 at 5:43 PM >>> Subject: Re: [Full-disclosu

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
x27;t you see that the advisory is about writing arbitrary files. If I >> was your boss I would fire you. >> -- Forwarded message -- >> From: Nicholas Lemonias. >> Date: Fri, Mar 14, 2014 at 5:43 PM >> Subject: Re: [Full-disclosure] Google vulnerabil

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Michal Zalewski
to minimizing risk. /mz _______ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
f attack, you should analyze everything your application >>> does with files and think carefully about what processing and interpreters >>> are involved. >>> >>> Your POC kinda does that, but you didn't provide proof it's possible to >>> e

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
example. What's to say that there isn't some >>>>>>> verification aspect to this post-processing that checks if the file is >>>>>>> intact a valid movie and if not removes it. >>>>>>> >>>>>>> If you could

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread J. Tozo
doubt know, when you upload a regular movie to >>>>>>>> YouTube, once uploaded it goes away and does some post-processing, >>>>>>>> converting it to flash for example. What's to say that there isn't some >>>>>>>> verification

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Krzysztof Kotowicz
e uploading a file to some kind of processing queue that does not validate a file type, but nevertheless only processes those files as video - there is NO reason to suspect otherwise, and I'd like to be proven wrong here. Proven as in PoC. _____

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Chris Thompson
_____ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread R D
oad for the security > world to see. > > However, this is not the way to treat security vulnerabilities. Attacking > the researcher and bringing you friends to do aswell, won't mitigate the > problem. > > > > ___ >

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Yvan Janssens
x27;s including video clips. We may upload for the security > world to see. > > However, this is not the way to treat security vulnerabilities. Attacking the > researcher and bringing you friends to do aswell, won't mitigate the problem. > > > _____

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread R D
> >>>> 2. You / we don't know what Google do with files once they have been >>>> received from the API - maybe they process them and validate them - we >>>> simply don't know. >>>> >>>> 3. You have hypothesized that you can retriev

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Chris Thompson
>>>> simply don't know. >>>> >>>> 3. You have hypothesized that you can retrieve the file by manipulating >>>> tokens etc and you may be right, but you have not demonstrated it as such. >>>> >>>> Because of this, you seem t

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread R D
provide proof it's possible to >> execute what you uploaded, either using social engineering or any other >> method. >> >> Also, please don't say "verified by a couple of recognised experts >> including OWASP" unless you actually spoke wit

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Julius Kivimäki
ng social engineering or any other >> method. >> >> Also, please don't say "verified by a couple of recognised experts >> including OWASP" unless you actually spoke with someone @owasp and she >> validated your findings. >> >> >> On

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Krzysztof Kotowicz
D find a vuln though. Do you really want that? Go ahead, start >> a crowdsourcing campaign! >> >> >> >> >> >> 2014-03-14 19:40 GMT+01:00 Nicholas Lemonias. > >: >> >>> We have many PoC's including video clips. We may upload for

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Alfredo Ortega
an >> unexpected file type. >> 2. The file is persistent and has not been deleted by YouTube. >> 3. It can be queried for information since it is assigned a unique >> upload_id. >> 4. It's successfully uploaded to youtube.com As you can see it give out >> the total bytes written to the remote network. >> 5. "content_type":"text/x-sh"}] ---> The file is a shell >> script script named 'file' >> 6. It can be enumerated by a non-authenticated user, remotely. >> ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread J. Tozo
s-flaws-in.html > > _______ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > -- Grato, J. Tozo _ °v° /(S)\

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Krzysztof Kotowicz
earcher and bringing you friends to do aswell, won't mitigate the > problem. > > > > _______ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Alfredo Ortega
ot; wrote: >>> We are on a different level perhaps. We do certainly disagree on those >>> points. >>> I wouldn't hire you as a consultant, if you can't tell if that is a >>> valid >>> vulnerability.. >>> ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Alfredo Ortega
I remember my early years in the infosec community - and sadly, >> so do >>>>>>> some of the more seasoned readers of this list :-) Back then, I >>>>>>> thought that the only thing that matter

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Thomas MacKenzie
security issues.  ___Full-Disclosure - We believe in it.Charter: http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/ Nicholas Lemonias. 14 March 2014 18:16 Google is a great service, but according to our proof of c

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Julius Kivimäki
t; lem.niko...@googlemail.com> wrote: > >> The full-disclosure mailing list has really changed. It's full of lamers >> nowdays aiming high. >> >> >> >> >> >> On Fri, Mar 14, 2014 at 5:58 PM, Nicholas Lemonias. < >> lem.niko...@goog

[Full-disclosure] CosmoShop unprotected admin-script "pwd.cgi" probably in all versions > 8.0

2014-03-14 Thread Rene Fischer
e the pwd.cgi file + Set the file permissions to not-accessible ("chmod 000 pwd.cgi")   _______ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

  1   2   3   4   5   6   7   8   9   10   >