Re: [FD] Microsoft Office - OLE Packager allows code execution in all Office versions, with macros disabled and high security templates applied

2015-07-03 Thread Stefan Kanthak
Kevin Beaumont wrote: > All - it is probably bad form to respond to my own post, but I've seen some > folk dismiss this out of hand on social media so I wanted to provide two > VERY QUICK proof of concept examples. These were just put together in 10 > minutes. > > http://owned.lab6.com/~gossi/re

[FD] ipTIME n104r3 vulnerable to CSRF and XSS attacks

2015-07-03 Thread Pierre Kim
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 ## Advisory Information Title: iptime n104r3 vulnerable to CSRF and XSS attacks Advisory URL: https://pierrekim.github.io/advisories/2015-iptime-0x01.txt Blog URL: https://pierrekim.github.io/blog/2015-07-03-iptime-n104r3-vulnerable-to-CSRF-and-X

Re: [FD] [##2255763##] ManageEngine Password Manager Pro 8.1 SQL Injection vulnerability

2015-07-03 Thread Password Manager Pro Support
Hi Blazej, Thanks for raising this issue. We have fixed the vulnerability and have released a hot fix release today. We will send out a security advisory to all our customers shortly. You can upgrade PMP to latest version or install the new version 8101 to fix the issue. You can access the rel

[FD] SQL Injection in easy2map wordpress plugin v1.24

2015-07-03 Thread Larry W. Cashdollar
Title: SQL Injection in easy2map wordpress plugin v1.24 Author: Larry W. Cashdollar, @_larry0 Date: 2015-06-08 Download Site: https://wordpress.org/plugins/easy2map Vendor: Steven Ellis Vendor Notified: 2015-06-08, fixed in v1.25 Vendor Contact: https://profiles.wordpress.org/stevenellis/ Advisory:

Re: [FD] Microsoft Office - OLE Packager allows code execution in all Office versions, with macros disabled and high security templates applied

2015-07-03 Thread Kevin Beaumont
All - it is probably bad form to respond to my own post, but I've seen some folk dismiss this out of hand on social media so I wanted to provide two VERY QUICK proof of concept examples. These were just put together in 10 minutes. http://owned.lab6.com/~gossi/research/public/packager/ There's an

[FD] Snorby 2.6.2 - Stored Cross-site Scripting Vulnerability

2015-07-03 Thread Federico Fazzi
Snorby 2.6.2 - Stored Cross-site Scripting Vulnerability Vendor -- https://www.snorby.org/ Version --- 2.6.2 Description --- During my research and testing of ne

Re: [FD] Google Chrome Address Spoofing (Request For Comment)

2015-07-03 Thread Daniel Wood
Yes this is a pretty good find. I can also confirm it works on iOS 8.3 (12F69) with Safari. DW Sent from my iPad > On Jul 2, 2015, at 9:33 AM, Mustafa Al-Bassam wrote: > > That's pretty neat. Played around with this and made a few discoveries. > > 1. It shows a valid certificate when you spoo

Re: [FD] [oss-security] Re: Google Chrome Address Spoofing (Request For Comment)

2015-07-03 Thread anidear
I played around with the code to see if can change it to avoid using the fork bomb. Here's what I came up with https://gist.github.com/ptantiku/d37c364cd13bb31a1ee6 It seems to need at least 500 threads to update the URL at 5ms for this to work (tested on Chrome x64 43.0.2357.130, Linux, locally).