[FD] CVE-2013-6216 - SetUID/SetGID Programs Allow Privilege Escalation Via Insecure RPATH in multiple HP products on Linux

2014-04-14 Thread Portcullis Advisories
Vulnerability title: SetUID/SetGID Programs Allow Privilege Escalation
Via Insecure RPATH in HP Array Configuration Utility, HP Array
Diagnostics Utility, HP ProLiant Array Diagnostics and SmartSSD Wear
Gauge Utility Running on Linux
CVE: CVE-2013-6216
Vendor: HP
Product: HP Array Configuration Utility, HP Array Diagnostics Utility,
HP ProLiant Array Diagnostics and SmartSSD Wear Gauge Utility Running on
Linux
Affected version: 9.40
Fixed version: N/A
Reported by: Tim Brown

Details:

It has been identified that binaries that are executed with elevated
privileges (SetGID and SetUID programs) have been compiled in manner
that means they searched for libraries in insecure locations.

An attacker could place a malicious library in one of the affected
directories, which would then be loaded when the affected program is
run, leading to privilege escalation in instances where the program runs
with privileges that the attacker does not have.


Further details at:
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2013-6216/


Copyright:
Copyright (c) Portcullis Computer Security Limited 2014, All rights
reserved worldwide. Permission is hereby granted for the electronic
redistribution of this information. It is not to be edited or altered in
any way without the express written consent of Portcullis Computer
Security Limited.

Disclaimer:
The information herein contained may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties, implied or otherwise, with regard to this information
or its use. Any use of this information is at the user's risk. In no
event shall the author/distributor (Portcullis Computer Security
Limited) be held liable for any damages whatsoever arising out of or in
connection with the use or spread of this information.

___
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] CVE-2014-2591 - SetUID/SetGID Programs Allow Privilege Escalation Via Insecure RPATH in BMC Patrol for AIX

2014-04-14 Thread Portcullis Advisories
Vulnerability title: SetUID/SetGID Programs Allow Privilege Escalation
Via Insecure RPATH in BMC Patrol for AIX
CVE: CVE-2014-2591
Vendor: BMC
Product: Patrol for AIX
Affected version: 3.9.00
Fixed version: N/A
Reported by: Tim Brown

Details:

It has been identified that binaries that are executed with elevated
privileges (SetGID and SetUID programs) have been compiled in manner
that means they searched for libraries in insecure locations.
   
An attacker could place a malicious library in one of the affected
directories, which would then be loaded when the affected program is
run, leading to privilege escalation in instances where the program runs
with privileges that the attacker does not have.


Further details at:
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2591/


Copyright:
Copyright (c) Portcullis Computer Security Limited 2014, All rights
reserved worldwide. Permission is hereby granted for the electronic
redistribution of this information. It is not to be edited or altered in
any way without the express written consent of Portcullis Computer
Security Limited.

Disclaimer:
The information herein contained may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties, implied or otherwise, with regard to this information
or its use. Any use of this information is at the user's risk. In no
event shall the author/distributor (Portcullis Computer Security
Limited) be held liable for any damages whatsoever arising out of or in
connection with the use or spread of this information.

___
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] PDF Album v1.7 iOS - File Include Web Vulnerability

2014-04-14 Thread Vulnerability Lab
Document Title:
===
PDF Album v1.7 iOS - File Include Web Vulnerability


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1255


Release Date:
=
2014-04-11


Vulnerability Laboratory ID (VL-ID):

1255


Common Vulnerability Scoring System:

7.3


Product & Service Introduction:
===
Here is a creative way to record an idea, a page in a book or newspapers, what 
you learned, even a travel memory. You can get content from camera, 
image or text editor, then pick them up into a pdf file and compose them as you 
wish. You can order the pages in project, then save the project 
and open it again when you want to add or change it. You can get pdfs via WIFI 
or read them in this app.

(Copy of the Homepage: https://itunes.apple.com/ch/app/pdf-album/id590232990 )


Abstract Advisory Information:
==
The Vulnerability Laboratory Research Team discovered a local file include web 
vulnerability in the official PDF Album  v1.7 iOS mobile application.


Vulnerability Disclosure Timeline:
==
2014-04-11: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Affected Product(s):

Lintao Zhao
Product: PDF Album - iOS Mobile Application 1.7


Exploitation Technique:
===
Remote


Severity Level:
===
High


Technical Details & Description:

A local file include web vulnerability has been discovered in the official PDF 
Album  v1.7 iOS mobile web-application. The local file include 
web vulnerability allows remote attackers to unauthorized include local 
file/path requests or system specific path commands to compromise 
the mobile web-application.

The web vulnerability is located in the `filename` value of the `upload` 
module. Remote attackers are able to inject own files with malicious 
`filename` values in the `upload` POST method request to compromise the mobile 
web-application. The local file/path include execution occcurs 
in the `pdf album index item` list context. The attacker can inject the local 
file include request by usage of the `wifi interface` or by a local 
privileged application user account via `folder sync`.

Attackers are also able to exploit the filename validation issue in combination 
with persistent injected script codes to execute different 
local malicious attacks requests. The attack vector is on the application-side 
of the wifi service and the request method to inject is POST. The security 
risk of the local file include web vulnerability is estimated as high(+) with a 
cvss (common vulnerability scoring system) count of 6.8(+)|(-)6.9.

Exploitation of the local file include web vulnerability requires no user 
interaction but a privileged web-application user account with low user auth. 
Successful exploitation of the local file include web vulnerability results in 
mobile application or connected device component compromise.

Request Method(s):
[+] [POST] - Remote
[+] [SYNC] - Local

Vulnerable Module(s):
[+] Browse File > Upload

Vulnerable Parameter(s):
[+] filename.*.pdf

Affected Module(s):
[+] PDF Album - Index Item Listing 
(http://localhost:8808/)


Proof of Concept (PoC):
===
The local file include web vulnerability can be exploited by local attackers 
with low privileged user account without required user interaction.
For security demonstration or to reproduce the local file include vulnerability 
follow the provided information and steps below to continue.

PoC: Exploit Code



NameDelete


>"<./[LOCAL FILE INCLUDE VULNERABILITY VIA PDF ALBUMNAME!">.pdfclass='del'>


%3E%22%3C./[LOCAL FILE INCLUDE VULNERABILITY VIA 
FILENAME!]%3E.pdf




PoC: Vulnerable Source


var now = new Date();
$.getJSON("/files?"+ now.toString(),
function(data){
  var shadow = false;
  $.each(data, function(i,item){
var trclass='';
if (shadow)
  trclass= " class='shadow'";
encodeName = encodeURI(item.name).replace("'", "'");
  $("" + item.name + "" + "
" + "").appendTo("#filelist"); shadow = !shadow; }); }); PoC Link: http://localhost:8808/files/%3E%22

[FD] New PHP-Attack Vector ?

2014-04-14 Thread Thomas Lußnig
In the last few days i see more and more scan's for an new php url
"/phpTest/zologize/axa.php" i never seen before on the server.
I think this can be an preparation for an new attack. Is there anything
known about this url and possible defects ?

Information: No Header is send with the request and no Query Parameter
is send.

IP's that Scanned the URL:
61.230.22.153  
54.200.15.115  
61.19.83.194   
103.13.30.157  
109.184.190.223
219.144.196.190
219.90.114.133 
221.215.217.106
140.116.102.61 


___
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Re: [FD] New PHP-Attack Vector ?

2014-04-14 Thread Michael Baker
Seems to be a shopping cart software.  A quick dork for that URI yields a
lot of results that seem to be susceptable to various well-known attack
vectors via a couple of quick (&harmless) manual checks.

- Mike


On Mon, Apr 14, 2014 at 5:29 PM, Thomas Lußnig  wrote:

> In the last few days i see more and more scan's for an new php url
> "/phpTest/zologize/axa.php" i never seen before on the server.
> I think this can be an preparation for an new attack. Is there anything
> known about this url and possible defects ?
>
> Information: No Header is send with the request and no Query Parameter
> is send.
>
> IP's that Scanned the URL:
> 61.230.22.153
> 54.200.15.115
> 61.19.83.194
> 103.13.30.157
> 109.184.190.223
> 219.144.196.190
> 219.90.114.133
> 221.215.217.106
> 140.116.102.61
>
>
> ___
> Sent through the Full Disclosure mailing list
> http://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: http://seclists.org/fulldisclosure/
>

___
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/