Update: 2015-02-14
1 new exploits
This commit is contained in:
parent
06f9de32a2
commit
fafd87dba3
4 changed files with 53 additions and 147 deletions
|
@ -32352,7 +32352,7 @@ id,file,description,date,author,platform,type,port
|
||||||
35897,platforms/windows/remote/35897.html,"CygniCon CyViewer ActiveX Control 'SaveData()' Insecure Method Vulnerability",2011-06-28,"High-Tech Bridge SA",windows,remote,0
|
35897,platforms/windows/remote/35897.html,"CygniCon CyViewer ActiveX Control 'SaveData()' Insecure Method Vulnerability",2011-06-28,"High-Tech Bridge SA",windows,remote,0
|
||||||
35898,platforms/multiple/remote/35898.php,"Atlassian JIRA <= 3.13.5 File Download Security Bypass Vulnerability",2011-06-28,"Ignacio Garrido",multiple,remote,0
|
35898,platforms/multiple/remote/35898.php,"Atlassian JIRA <= 3.13.5 File Download Security Bypass Vulnerability",2011-06-28,"Ignacio Garrido",multiple,remote,0
|
||||||
35899,platforms/php/webapps/35899.txt,"Mangallam CMS - SQL Injection Web Vulnerability",2015-01-26,Vulnerability-Lab,php,webapps,0
|
35899,platforms/php/webapps/35899.txt,"Mangallam CMS - SQL Injection Web Vulnerability",2015-01-26,Vulnerability-Lab,php,webapps,0
|
||||||
35900,platforms/php/webapps/35900.txt,"Barracuda Networks Cloud Series - Filter Bypass Vulnerability",2015-01-26,Vulnerability-Lab,php,webapps,0
|
35900,platforms/cgi/webapps/35900.txt,"Barracuda Networks Cloud Series - Filter Bypass Vulnerability",2015-01-26,Vulnerability-Lab,cgi,webapps,0
|
||||||
35901,platforms/windows/local/35901.txt,"VLC Player 2.1.5 - DEP Access Violation Vulnerability",2015-01-26,"Veysel HATAS",windows,local,0
|
35901,platforms/windows/local/35901.txt,"VLC Player 2.1.5 - DEP Access Violation Vulnerability",2015-01-26,"Veysel HATAS",windows,local,0
|
||||||
35902,platforms/windows/local/35902.txt,"VLC Player 2.1.5 - Write Access Violation Vulnerability",2015-01-26,"Veysel HATAS",windows,local,0
|
35902,platforms/windows/local/35902.txt,"VLC Player 2.1.5 - Write Access Violation Vulnerability",2015-01-26,"Veysel HATAS",windows,local,0
|
||||||
35904,platforms/jsp/webapps/35904.txt,"ManageEngine ServiceDesk Plus 9.0 (< Build 9031) - User Privileges Management Vulnerability",2015-01-26,"Rewterz - Research Group",jsp,webapps,0
|
35904,platforms/jsp/webapps/35904.txt,"ManageEngine ServiceDesk Plus 9.0 (< Build 9031) - User Privileges Management Vulnerability",2015-01-26,"Rewterz - Research Group",jsp,webapps,0
|
||||||
|
@ -32499,3 +32499,4 @@ id,file,description,date,author,platform,type,port
|
||||||
36056,platforms/windows/remote/36056.rb,"Achat v0.150 beta7 Buffer Overflow",2015-02-11,metasploit,windows,remote,9256
|
36056,platforms/windows/remote/36056.rb,"Achat v0.150 beta7 Buffer Overflow",2015-02-11,metasploit,windows,remote,9256
|
||||||
36057,platforms/cgi/webapps/36057.txt,"IBM Endpoint Manager - Stored XSS Vulnerability",2015-02-11,"RedTeam Pentesting",cgi,webapps,52311
|
36057,platforms/cgi/webapps/36057.txt,"IBM Endpoint Manager - Stored XSS Vulnerability",2015-02-11,"RedTeam Pentesting",cgi,webapps,52311
|
||||||
36058,platforms/php/webapps/36058.txt,"Wordpress Video Gallery 2.7.0 - SQL Injection Vulnerability",2015-02-12,"Claudio Viviani",php,webapps,0
|
36058,platforms/php/webapps/36058.txt,"Wordpress Video Gallery 2.7.0 - SQL Injection Vulnerability",2015-02-12,"Claudio Viviani",php,webapps,0
|
||||||
|
36059,platforms/php/webapps/36059.txt,"Exponent CMS 2.3.1 - Multiple XSS Vulnerabilities",2015-02-12,"Mayuresh Dani",php,webapps,80
|
||||||
|
|
Can't render this file because it is too large.
|
|
@ -1,143 +0,0 @@
|
||||||
Document Title:
|
|
||||||
===============
|
|
||||||
Barracuda Networks Cloud Series - Filter Bypass Vulnerability
|
|
||||||
|
|
||||||
|
|
||||||
References (Source):
|
|
||||||
====================
|
|
||||||
http://www.vulnerability-lab.com/get_content.php?id=754
|
|
||||||
|
|
||||||
Barracuda Networks Security ID (BNSEC): 731
|
|
||||||
|
|
||||||
|
|
||||||
Release Date:
|
|
||||||
=============
|
|
||||||
2015-01-19
|
|
||||||
|
|
||||||
|
|
||||||
Vulnerability Laboratory ID (VL-ID):
|
|
||||||
====================================
|
|
||||||
754
|
|
||||||
|
|
||||||
|
|
||||||
Common Vulnerability Scoring System:
|
|
||||||
====================================
|
|
||||||
4.5
|
|
||||||
|
|
||||||
|
|
||||||
Abstract Advisory Information:
|
|
||||||
==============================
|
|
||||||
The Vulnerability Laboratory Research Team discovered a filter bypass vulnerability in the official Barracuda Cloud Series Products.
|
|
||||||
|
|
||||||
|
|
||||||
Vulnerability Disclosure Timeline:
|
|
||||||
==================================
|
|
||||||
2015-01-19: Public Disclosure (Vulnerability Laboratory)
|
|
||||||
|
|
||||||
|
|
||||||
Discovery Status:
|
|
||||||
=================
|
|
||||||
Published
|
|
||||||
|
|
||||||
|
|
||||||
Affected Product(s):
|
|
||||||
====================
|
|
||||||
Barracuda Networks
|
|
||||||
Product: Cloud Control Center 2014 Q2
|
|
||||||
|
|
||||||
|
|
||||||
Exploitation Technique:
|
|
||||||
=======================
|
|
||||||
Remote
|
|
||||||
|
|
||||||
|
|
||||||
Severity Level:
|
|
||||||
===============
|
|
||||||
Medium
|
|
||||||
|
|
||||||
|
|
||||||
Technical Details & Description:
|
|
||||||
================================
|
|
||||||
A filter bypass vulnerability has been discovered in the official Barracuda Networks Cloud Series Appliance Applications 2014-Q1.
|
|
||||||
The filter bypass issue allows an attacker to bypass the secure filter validation of the service to execute malicious script codes.
|
|
||||||
|
|
||||||
The barracuda filter blocks for example standard iframes, scripts and other invalid code context: The cloud service has a own exception-handling
|
|
||||||
to parse or encode malicious injected web context. The mechanism filters the first request and sanitizes the output in every input field.
|
|
||||||
|
|
||||||
During a pentest we injected a standard iframe to check and provoke the validation. The frame got blocked! In the next step the attacker splits (%20%20%20)
|
|
||||||
the request and injects at the end an onload frame to an external malicious source. The second iframe with the onload alert executes the script codes after
|
|
||||||
the validation encoded only the first script code tag. The second script code tag can bypass the applicance filter mechanism and executes in the web context
|
|
||||||
of affected modules. The secure validation does not recognize a splitted request which results in client-side and application-side script code execution in
|
|
||||||
the cloud series products.
|
|
||||||
|
|
||||||
The security risk of the filter bypass vulnerability is estimated as medium and the cvss (common vulnerability scoring system) count is 4.5 (medium).
|
|
||||||
Exploitation of the filter bypass vulnerability requires a low privileged application user account with restricted access and low user interaction.
|
|
||||||
Successful exploitation of the vulnerability results in session hijacking, persistent phishing, persistent external redirects and persistent manipulation
|
|
||||||
of affected or connected module context.
|
|
||||||
|
|
||||||
Vulnerable Request Method(s):
|
|
||||||
[+] POST & GET
|
|
||||||
|
|
||||||
|
|
||||||
Proof of Concept (PoC):
|
|
||||||
=======================
|
|
||||||
The filter bypass web vulnerability can be exploited by local privileged user accounts and remote attackers with low or medium user interaction.
|
|
||||||
For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue.
|
|
||||||
|
|
||||||
PoC:
|
|
||||||
<iframe src=a>%20%20%20%20\"><iframe src=http://vuln-lab.com onload=alert("VL") <
|
|
||||||
|
|
||||||
PoC:
|
|
||||||
<script language=JavaScript>m='%3Ciframe%20src%3Da%3E%2520%2520%2520%2520%5C%22%3E%3Ciframe%20src%3Dhttp%3A//vuln-lab.com%20onload%3Dalert%28%22VL%22%29%20%3C';d=unescape(m);document.write(d);</script>
|
|
||||||
|
|
||||||
|
|
||||||
Solution - Fix & Patch:
|
|
||||||
=======================
|
|
||||||
The issue can be patched by a secure validation of the full message input body context of any input or request method attempt.
|
|
||||||
Ensure that the validaton does not only encode the first injected script code since a empty char arrives. Filter all web context
|
|
||||||
that runs through the requesting procedure and parse separatly to prevent script code injection attacks.
|
|
||||||
|
|
||||||
Note: Barracuda Networks patched the vulnerability and acknowledged the researcher. Updates are available in Barracuda Labs and the Customer Service.
|
|
||||||
|
|
||||||
|
|
||||||
Security Risk:
|
|
||||||
==============
|
|
||||||
The security risk of the filter bypass web vulnerability in the barracuda cloud product series is estimated as medium. (CVSS 4.5)
|
|
||||||
|
|
||||||
|
|
||||||
Credits & Authors:
|
|
||||||
==================
|
|
||||||
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@evolution-sec.com) [www.vulnerability-lab.com]
|
|
||||||
|
|
||||||
|
|
||||||
Disclaimer & Information:
|
|
||||||
=========================
|
|
||||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed
|
|
||||||
or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable
|
|
||||||
in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab
|
|
||||||
or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for
|
|
||||||
consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses,
|
|
||||||
policies, deface websites, hack into databases or trade with fraud/stolen material.
|
|
||||||
|
|
||||||
Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.evolution-sec.com
|
|
||||||
Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com
|
|
||||||
Section: magazine.vulnerability-db.com - vulnerability-lab.com/contact.php - evolution-sec.com/contact
|
|
||||||
Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab
|
|
||||||
Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php
|
|
||||||
Programs: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register/
|
|
||||||
|
|
||||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to
|
|
||||||
electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by
|
|
||||||
Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website
|
|
||||||
is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact
|
|
||||||
(admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.
|
|
||||||
|
|
||||||
Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
|
||||||
|
|
||||||
--
|
|
||||||
VULNERABILITY LABORATORY - RESEARCH TEAM
|
|
||||||
SERVICE: www.vulnerability-lab.com
|
|
||||||
CONTACT: research@vulnerability-lab.com
|
|
||||||
PGP KEY: http://www.vulnerability-lab.com/keys/admin@vulnerability-lab.com%280x198E9928%29.txt
|
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
?######################
|
######################
|
||||||
|
|
||||||
# Exploit Title : Wordpress Video Gallery 2.7 SQL Injection Vulnerabilitiey
|
# Exploit Title : Wordpress Video Gallery 2.7 SQL Injection Vulnerability
|
||||||
|
|
||||||
# Exploit Author : Claudio Viviani
|
# Exploit Author : Claudio Viviani
|
||||||
|
|
||||||
|
@ -40,7 +40,7 @@ http://target/wp-admin/admin-ajax.php?action=rss&type=video&vid=[SQLi]
|
||||||
|
|
||||||
#####################
|
#####################
|
||||||
|
|
||||||
# Fix/patch sended by apptha's developer
|
# Fix/patch sent by apptha's developer
|
||||||
|
|
||||||
File: videogalleryrss.php
|
File: videogalleryrss.php
|
||||||
|
|
||||||
|
|
48
platforms/php/webapps/36059.txt
Executable file
48
platforms/php/webapps/36059.txt
Executable file
|
@ -0,0 +1,48 @@
|
||||||
|
######################
|
||||||
|
# Exploit Title: Multiple Exponent CMS Cross-Site Scripting Vulnerabilies
|
||||||
|
# Discovered by-
|
||||||
|
# Mayuresh Dani (mdani@qualys.com)
|
||||||
|
# Narendra Shinde (nshinde@qualys.com)
|
||||||
|
# Vendor Homepage: http://www.exponentcms.org/
|
||||||
|
# Software Link:
|
||||||
|
http://sourceforge.net/projects/exponentcms/files/exponent-2.3.1.zip/download
|
||||||
|
# Version: 2.3.1
|
||||||
|
# Date: 2014-10-11
|
||||||
|
# Tested on: Windows 7 / Mozilla Firefox
|
||||||
|
# Ubuntu 14.04 / Mozilla Firefox
|
||||||
|
# CVE: CVE-2014-8690
|
||||||
|
######################
|
||||||
|
# Vulnerability Disclosure Timeline:
|
||||||
|
# 2014-11-04: Discovered vulnerability
|
||||||
|
# 2014-11-04: Vendor Notification
|
||||||
|
# 2014-11-05: Vendor confirmation
|
||||||
|
# 2014-11-06: Vendor fixes Universal XSS -
|
||||||
|
http://www.exponentcms.org/news/security-patch-released-for-v2-1-4-v2-2-3-and-v2-3-0
|
||||||
|
# 2015-02-12: Public Disclosure
|
||||||
|
######################
|
||||||
|
# Description
|
||||||
|
# Exponent CMS is a free, open source, open standards modular enterprise
|
||||||
|
software framework and content management system (CMS) written in the PHP.
|
||||||
|
#
|
||||||
|
# CVE-2014-8690:
|
||||||
|
# Universal XSS - Exponent CMS builds the canonical path field from an
|
||||||
|
unsanitized URL, which can be used to execute arbitrary scripts.
|
||||||
|
# Examples:
|
||||||
|
#
|
||||||
|
http://server/news/show/title/time-for-a-heavy-harvest-new-release/src/%22%3E%3Cscript%3Ealert%287%29%3C/script%3E@random4cd201e063d5c
|
||||||
|
#
|
||||||
|
http://server/news/show/title/%22%3E%3Cscript%3Ealert%287%29%3C/script%3Etime-for-a-heavy-harvest-new-release/src/@random4cd201e063d5c
|
||||||
|
#
|
||||||
|
http://server/news/%22%3E%3Cscript%3Ealert%287%29%3C/script%3Eshow/title/time-for-a-heavy-harvest-new-release/src/@random4cd201e063d5c
|
||||||
|
#
|
||||||
|
# 2.b. XSS in user profiles.
|
||||||
|
# The "First Name" and "Last Name" fields on
|
||||||
|
http://server/exponent/users/edituser are not sufficiently sanitized. Enter
|
||||||
|
your favourite script and the application will execute it everytime for you.
|
||||||
|
#
|
||||||
|
# More information and PoCs -
|
||||||
|
http://exponentcms.lighthouseapp.com/projects/61783/tickets/1230-universal-cross-site-scripting-in-exponent-cms-231-and-prior
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Thanks,
|
||||||
|
# Mayuresh & Narendra
|
Loading…
Add table
Reference in a new issue