diff --git a/files.csv b/files.csv index 4699d218c..9d4e2f338 100644 --- a/files.csv +++ b/files.csv @@ -37488,3 +37488,8 @@ id,file,description,date,author,platform,type,port 41572,platforms/hardware/webapps/41572.txt,"ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Session Stealing",2017-03-08,"Bruno Bierbaumer",hardware,webapps,0 41573,platforms/hardware/webapps/41573.txt,"ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Remote Code Execution",2017-03-08,"Bruno Bierbaumer",hardware,webapps,0 41574,platforms/xml/webapps/41574.html,"FTP Voyager Scheduler 16.2.0 - Cross-Site Request Forgery",2017-03-10,hyp3rlinx,xml,webapps,52986 +41575,platforms/php/webapps/41575.txt,"Price Comparison Script 2017.1.8 - SQL Injection",2017-03-10,"Ihsan Sencan",php,webapps,0 +41576,platforms/php/webapps/41576.txt,"Clickbank Affiliate Marketplace Script 2017 - SQL Injection",2017-03-10,"Ihsan Sencan",php,webapps,0 +41577,platforms/jsp/webapps/41577.txt,"Kinsey Infor/Lawson / ESBUS - SQL Injection",2017-03-10,"Michael Benich",jsp,webapps,0 +41579,platforms/xml/webapps/41579.html,"WatchGuard XTMv 11.12 Build 516911 - User Management Cross-Site Request Forgery",2017-03-10,KoreLogic,xml,webapps,0 +41578,platforms/cgi/webapps/41578.txt,"dnaLIMS DNA Sequencing - Directory Traversal / Session Hijacking / Cross-Site Scripting",2017-03-10,"Shorebreak Security",cgi,webapps,0 diff --git a/platforms/cgi/webapps/41578.txt b/platforms/cgi/webapps/41578.txt new file mode 100755 index 000000000..ee2cf2e91 --- /dev/null +++ b/platforms/cgi/webapps/41578.txt @@ -0,0 +1,114 @@ +Title: Multiple vulnerabilities discovered in dnaLIMS DNA sequencing +web-application +Advisory URL: https://www.shorebreaksecurity.com/blog/product-security-advisory-psa0002-dnalims/ +Date published: Mar 08, 2017 +Vendor: dnaTools, Inc. +CVE IDs: [2017-6526, 2017-6527, 2017-6528, 2017-6529] +USCERT VU: 929263 + +Vulnerability Summaries +1) Improperly protected web shell [CVE-2017-6526] +dnaLIMS requires authentication to view cgi-bin/dna/sysAdmin.cgi, which is +a web shell included with the software running as the web user. However, +sending a POST request to that page bypasses authentication checks, +including the UID parameter within the POST request. + +2) Unauthenticated Directory Traversal [CVE-2017-6527] +The viewAppletFsa.cgi seqID parameter is vulnerable to a null terminated +directory traversal attack. This allows an unauthenticated attacker to +retrieve files on the operating system accessible by the permissions of the +web server. This page also does not require authentication, allowing any +person on the Internet to exploit this vulnerability. + +3) Insecure Password Storage [CVE-2017-6528] +An option, which is most likely the default, allows the password file +(/home/dna/spool/.pfile) to store clear text passwords. When combined with +the unauthenticated directory traversal vulnerability, it is possible to +gain the username and password for all users of the software and gain +complete control of the software. + +4) Session Hijacking [CVE-2017-6529] +Each user of the dnaLIMS software is assigned a unique four-digit user +identification number(UID) upon account creation. These numbers appear to +be assigned sequentially. Multiple pages of the dnaLIMS application require +that this UID be passed as a URL parameter in order to view the content of +the page. +Consider the following example: +The URL ahttp:///cgi-bin/dna/seqreq2N.cgi?username=61685578,2410a is a valid URL +to view the page for sequencing requests for the user with the UID of 2410. The +username parameter of the URL is the mechanism for authentication to the +system. The first eight-digit number of the username parameter appears to +be a session identifier as it changes every time the user logs in from the +password.cgi page, however this value is not checked by the seqreq2N.cgi +page. This allows an attacker to guess the four-digit UID of valid user +accounts that have an active session. The user with the UID of 2419 +currently has an active session, so we can simply hijack this useras +session by requesting this page and specifying the UID 2419. + +5) Cross-site Scripting +The seqID parameter of the viewAppletFsa.cgi page is vulnerable to a +reflected cross site scripting attack via GET request as seen in the +following URL: +http:///cgi-bin/dna/viewAppletFsa.cgi?seqID=7415-7