From 1c19131a6731fe4c41ec0a734ed2fbcd9095991d Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Mon, 20 Jan 2014 04:24:38 +0000 Subject: [PATCH] Updated 01_20_2014 --- files.csv | 2 ++ platforms/cgi/webapps/31025.txt | 7 +++++++ platforms/hardware/remote/31024.txt | 9 +++++++++ 3 files changed, 18 insertions(+) create mode 100755 platforms/cgi/webapps/31025.txt create mode 100755 platforms/hardware/remote/31024.txt diff --git a/files.csv b/files.csv index 815935a2a..5ba25f783 100755 --- a/files.csv +++ b/files.csv @@ -27839,3 +27839,5 @@ id,file,description,date,author,platform,type,port 31021,platforms/osx/dos/31021.html,"Apple Safari <= 2.0.4 KHTML WebKit Remote Denial of Service Vulnerability",2008-01-12,"David Barroso",osx,dos,0 31022,platforms/php/webapps/31022.txt,"PHP Running Management 1.0.2 'index.php' Cross Site Scripting Vulnerability",2008-01-13,"Christophe VG",php,webapps,0 31023,platforms/windows/remote/31023.html,"Qvod Player 2.1.5 'QvodInsert.dll' ActiveX Control Remote Buffer Overflow Vulnerability",2008-01-11,anonymous,windows,remote,0 +31024,platforms/hardware/remote/31024.txt,"F5 BIG-IP <= 9.4.3 'SearchString' Multiple Cross-Site Scripting Vulnerabilities",2008-01-14,nnposter,hardware,remote,0 +31025,platforms/cgi/webapps/31025.txt,"Garment Center 'index.cgi' Local File Include Vulnerability",2008-01-14,Smasher,cgi,webapps,0 diff --git a/platforms/cgi/webapps/31025.txt b/platforms/cgi/webapps/31025.txt new file mode 100755 index 000000000..af080eafe --- /dev/null +++ b/platforms/cgi/webapps/31025.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/27273/info + +Garment Center is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. + +Exploiting this issue may allow an unauthorized user to view files and execute local scripts. + +http://www.example.com/index.cgi?page=../../../../../../../../etc/passwd%00 \ No newline at end of file diff --git a/platforms/hardware/remote/31024.txt b/platforms/hardware/remote/31024.txt new file mode 100755 index 000000000..7212fc62e --- /dev/null +++ b/platforms/hardware/remote/31024.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/27272/info + +F5 BIG-IP is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +BIG-IP firmware version 9.4.3 is vulnerable; other versions may also be affected. + +https://www.example.com?SearchString=%22%20type=%22hidden%22%3E%3Cscript%3Ealert(%22list-xss%22)%3C/script%3E%3Cinput%20type=%22hidden%22%20value=%22 \ No newline at end of file