
6 new exploits Debian and Derivatives OpenSSL 0.9.8c-1 < 0.9.8g-9 - Predictable PRNG Brute Force SSH Exploit (Perl) Debian and Derivatives OpenSSL 0.9.8c-1 < 0.9.8g-9 - Predictable PRNG Brute Force SSH Exploit (Ruby) OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - (Predictable PRNG) Brute Force SSH (Perl) OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - (Predictable PRNG) Brute Force SSH (Ruby) Debian and Derivatives OpenSSL 0.9.8c-1 < 0.9.8g-9 - Predictable PRNG Brute Force SSH Exploit (Python) OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - (Predictable PRNG) Brute Force SSH (Python) Boa WebServer 0.94.x - Terminal Escape Sequence in Logs Command Injection Boa Web Server 0.94.x - Terminal Escape Sequence in Logs Command Injection eVestigator Forensic PenTester - MITM Remote Code Execution BestSafe Browser - MITM Remote Code Execution Personify360 7.5.2/7.6.1 - Improper Access Restrictions Personify360 7.5.2/7.6.1 - Improper Database Schema Access Restrictions Sophos Cyberoam - Cross-site scripting BOA Web Server 0.94.14rc21 - Arbitrary File Access
27 lines
900 B
Text
Executable file
27 lines
900 B
Text
Executable file
# Exploit Title: Discover all tables and columns in database when creating new customer role
|
||
# Date: 3/29/2017
|
||
# Exploit Author: Pesach Zirkind
|
||
# Vendor Homepage: https://personifycorp.com/
|
||
# Version: 7.5.2 - 7.6.1
|
||
# Tested on: Windows (all versions)
|
||
# CVE : CVE-2017-7314
|
||
|
||
# Category: webapps
|
||
|
||
1. Description
|
||
|
||
Any website visitor can access a page that allows creation of a new customer role, while creating the role there is access to the database schema showing all the tables and their columns
|
||
|
||
It does not show the data in the database only the schema
|
||
|
||
2. Proof of Concept
|
||
|
||
Visit: http://site.com/Default.aspx?tabId=275
|
||
Click: Role Configuration on the left side
|
||
Click New
|
||
Select the "Role Based on Table" dropdown
|
||
|
||
3. Solution:
|
||
|
||
The fix is available at Personify’s SFTP site (sftp.personifycorp.com) as Personify Patch – SSO-IMS-DNN-Permission.zip
|
||
|