[FD] CVE-2013-6216 - SetUID/SetGID Programs Allow Privilege Escalation Via Insecure RPATH in multiple HP products on Linux
Vulnerability title: SetUID/SetGID Programs Allow Privilege Escalation Via Insecure RPATH in HP Array Configuration Utility, HP Array Diagnostics Utility, HP ProLiant Array Diagnostics and SmartSSD Wear Gauge Utility Running on Linux CVE: CVE-2013-6216 Vendor: HP Product: HP Array Configuration Utility, HP Array Diagnostics Utility, HP ProLiant Array Diagnostics and SmartSSD Wear Gauge Utility Running on Linux Affected version: 9.40 Fixed version: N/A Reported by: Tim Brown Details: It has been identified that binaries that are executed with elevated privileges (SetGID and SetUID programs) have been compiled in manner that means they searched for libraries in insecure locations. An attacker could place a malicious library in one of the affected directories, which would then be loaded when the affected program is run, leading to privilege escalation in instances where the program runs with privileges that the attacker does not have. Further details at: https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2013-6216/ Copyright: Copyright (c) Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited. Disclaimer: The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information. ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
[FD] CVE-2014-2591 - SetUID/SetGID Programs Allow Privilege Escalation Via Insecure RPATH in BMC Patrol for AIX
Vulnerability title: SetUID/SetGID Programs Allow Privilege Escalation Via Insecure RPATH in BMC Patrol for AIX CVE: CVE-2014-2591 Vendor: BMC Product: Patrol for AIX Affected version: 3.9.00 Fixed version: N/A Reported by: Tim Brown Details: It has been identified that binaries that are executed with elevated privileges (SetGID and SetUID programs) have been compiled in manner that means they searched for libraries in insecure locations. An attacker could place a malicious library in one of the affected directories, which would then be loaded when the affected program is run, leading to privilege escalation in instances where the program runs with privileges that the attacker does not have. Further details at: https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2591/ Copyright: Copyright (c) Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited. Disclaimer: The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information. ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
[FD] PDF Album v1.7 iOS - File Include Web Vulnerability
Document Title: === PDF Album v1.7 iOS - File Include Web Vulnerability References (Source): http://www.vulnerability-lab.com/get_content.php?id=1255 Release Date: = 2014-04-11 Vulnerability Laboratory ID (VL-ID): 1255 Common Vulnerability Scoring System: 7.3 Product & Service Introduction: === Here is a creative way to record an idea, a page in a book or newspapers, what you learned, even a travel memory. You can get content from camera, image or text editor, then pick them up into a pdf file and compose them as you wish. You can order the pages in project, then save the project and open it again when you want to add or change it. You can get pdfs via WIFI or read them in this app. (Copy of the Homepage: https://itunes.apple.com/ch/app/pdf-album/id590232990 ) Abstract Advisory Information: == The Vulnerability Laboratory Research Team discovered a local file include web vulnerability in the official PDF Album v1.7 iOS mobile application. Vulnerability Disclosure Timeline: == 2014-04-11: Public Disclosure (Vulnerability Laboratory) Discovery Status: = Published Affected Product(s): Lintao Zhao Product: PDF Album - iOS Mobile Application 1.7 Exploitation Technique: === Remote Severity Level: === High Technical Details & Description: A local file include web vulnerability has been discovered in the official PDF Album v1.7 iOS mobile web-application. The local file include web vulnerability allows remote attackers to unauthorized include local file/path requests or system specific path commands to compromise the mobile web-application. The web vulnerability is located in the `filename` value of the `upload` module. Remote attackers are able to inject own files with malicious `filename` values in the `upload` POST method request to compromise the mobile web-application. The local file/path include execution occcurs in the `pdf album index item` list context. The attacker can inject the local file include request by usage of the `wifi interface` or by a local privileged application user account via `folder sync`. Attackers are also able to exploit the filename validation issue in combination with persistent injected script codes to execute different local malicious attacks requests. The attack vector is on the application-side of the wifi service and the request method to inject is POST. The security risk of the local file include web vulnerability is estimated as high(+) with a cvss (common vulnerability scoring system) count of 6.8(+)|(-)6.9. Exploitation of the local file include web vulnerability requires no user interaction but a privileged web-application user account with low user auth. Successful exploitation of the local file include web vulnerability results in mobile application or connected device component compromise. Request Method(s): [+] [POST] - Remote [+] [SYNC] - Local Vulnerable Module(s): [+] Browse File > Upload Vulnerable Parameter(s): [+] filename.*.pdf Affected Module(s): [+] PDF Album - Index Item Listing (http://localhost:8808/) Proof of Concept (PoC): === The local file include web vulnerability can be exploited by local attackers with low privileged user account without required user interaction. For security demonstration or to reproduce the local file include vulnerability follow the provided information and steps below to continue. PoC: Exploit Code NameDelete >"<./[LOCAL FILE INCLUDE VULNERABILITY VIA PDF ALBUMNAME!">.pdfclass='del'> %3E%22%3C./[LOCAL FILE INCLUDE VULNERABILITY VIA FILENAME!]%3E.pdf PoC: Vulnerable Source var now = new Date(); $.getJSON("/files?"+ now.toString(), function(data){ var shadow = false; $.each(data, function(i,item){ var trclass=''; if (shadow) trclass= " class='shadow'"; encodeName = encodeURI(item.name).replace("'", "'"); $("").appendTo("#filelist"); shadow = !shadow; }); }); PoC Link: http://localhost:8808/files/%3E%22 " + item.name + " " + "" + "
[FD] New PHP-Attack Vector ?
In the last few days i see more and more scan's for an new php url "/phpTest/zologize/axa.php" i never seen before on the server. I think this can be an preparation for an new attack. Is there anything known about this url and possible defects ? Information: No Header is send with the request and no Query Parameter is send. IP's that Scanned the URL: 61.230.22.153 54.200.15.115 61.19.83.194 103.13.30.157 109.184.190.223 219.144.196.190 219.90.114.133 221.215.217.106 140.116.102.61 ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Re: [FD] New PHP-Attack Vector ?
Seems to be a shopping cart software. A quick dork for that URI yields a lot of results that seem to be susceptable to various well-known attack vectors via a couple of quick (&harmless) manual checks. - Mike On Mon, Apr 14, 2014 at 5:29 PM, Thomas Lußnig wrote: > In the last few days i see more and more scan's for an new php url > "/phpTest/zologize/axa.php" i never seen before on the server. > I think this can be an preparation for an new attack. Is there anything > known about this url and possible defects ? > > Information: No Header is send with the request and no Query Parameter > is send. > > IP's that Scanned the URL: > 61.230.22.153 > 54.200.15.115 > 61.19.83.194 > 103.13.30.157 > 109.184.190.223 > 219.144.196.190 > 219.90.114.133 > 221.215.217.106 > 140.116.102.61 > > > ___ > Sent through the Full Disclosure mailing list > http://nmap.org/mailman/listinfo/fulldisclosure > Web Archives & RSS: http://seclists.org/fulldisclosure/ > ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/