
6 new exploits Debian and Derivatives OpenSSL 0.9.8c-1 < 0.9.8g-9 - Predictable PRNG Brute Force SSH Exploit (Perl) Debian and Derivatives OpenSSL 0.9.8c-1 < 0.9.8g-9 - Predictable PRNG Brute Force SSH Exploit (Ruby) OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - (Predictable PRNG) Brute Force SSH (Perl) OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - (Predictable PRNG) Brute Force SSH (Ruby) Debian and Derivatives OpenSSL 0.9.8c-1 < 0.9.8g-9 - Predictable PRNG Brute Force SSH Exploit (Python) OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - (Predictable PRNG) Brute Force SSH (Python) Boa WebServer 0.94.x - Terminal Escape Sequence in Logs Command Injection Boa Web Server 0.94.x - Terminal Escape Sequence in Logs Command Injection eVestigator Forensic PenTester - MITM Remote Code Execution BestSafe Browser - MITM Remote Code Execution Personify360 7.5.2/7.6.1 - Improper Access Restrictions Personify360 7.5.2/7.6.1 - Improper Database Schema Access Restrictions Sophos Cyberoam - Cross-site scripting BOA Web Server 0.94.14rc21 - Arbitrary File Access
30 lines
1,007 B
Text
Executable file
30 lines
1,007 B
Text
Executable file
# Exploit Title: Access and read and create vendor / API credentials in plaintext
|
||
# Date: 3/29/2017
|
||
# Exploit Author: Pesach Zirkind
|
||
# Vendor Homepage: https://personifycorp.com/
|
||
# Version: 7.5.2 - 7.6.1
|
||
# Tested on: Windows (all versions)
|
||
# CVE : CVE-2017-7312
|
||
|
||
# Category: webapps
|
||
|
||
1. Description
|
||
|
||
Any website visitor can access a page that allows viewing and creating any vendor accounts and their credentials including all applications that use Personify API's
|
||
|
||
It will show username, password and block(api password)
|
||
|
||
New accounts can be created, or, existing accounts can be used to spoof the origin of attacker.
|
||
|
||
Additionally, roles can be modified for existing vendors
|
||
|
||
2. Proof of Concept
|
||
|
||
Visit: http://site.com/Default.aspx?tabId=275
|
||
Click: Vendor Management on the left side
|
||
Click on the vendor you wish to edit
|
||
|
||
3. Solution:
|
||
|
||
The fix is available at Personify’s SFTP site (sftp.personifycorp.com) as Personify Patch – SSO-IMS-DNN-Permission.zip
|
||
|