[FD] It essentially wins crypto vulnerability bingo! gilfether/phpcrypt

2016-01-16 Thread Scott Arciszewski
dous in any language. Even if you have a mathematics background. If you can't afford to hire a cryptography expert to audit your library before you publish it, you should seriously consider using one that the community has already reviewed for free. Scott Arciszewski Chief Development

[FD] CCA on CoreProc/crypto-guard and an Appeal to PHP Programmers

2016-01-15 Thread Scott Arciszewski
--' I hope you find my proposal to be sane and reasonable enough to adhere to, for the sake of your own applications. Please share this flowchart with every (especially but necessarily PHP) programmer you know until these mistakes are era

[FD] Joomla CMS - Bad Cryptography - Multiple Vulnerabilities

2015-11-10 Thread Scott Arciszewski
://github.com/zendframework/zend-crypt Additionally, anyone whose PCI/whatever compliance is in any way hinged upon the cryptography that Joomla provided should probably notify their pen-testers and get re-evaluated with this new information at their earliest convenience. That's all from me

[FD] Just Don't Use or Trust Bullhorn

2015-09-07 Thread Scott Arciszewski
Story time, FD. Hopefully I can save someone else from having to deal with the frustration of dealing with Bullhorn. March 3, 2014 - I observed that SendOuts (owned by Bullhorn) didn't use HTTPS even though it was available, nor HSTS once someone explicitly accessed the https://webconnect3.sendou

Re: [FD] AnchorCMS - PHP Object Injection (CVE-2015-5687) and More

2015-08-29 Thread Scott Arciszewski
Corrected links: > https://github.com/anchorcms/anchor-cms/blob/07933dbc7939326bb4973827a0934d1a610851d1/system/helpers.php#L55-L59 > https://github.com/anchorcms/anchor-cms/blob/66581e5969029e7b6dfddfe3326bb9f15f27b859/anchor/libraries/hash.php#L15 Scott Arciszewski Chief Development O

[FD] AnchorCMS - PHP Object Injection (CVE-2015-5687) and More

2015-08-27 Thread Scott Arciszewski
e just as bad. In publishing this, we hope that the AnchorCMS development team is able to wake up and reconnect with the community, and more importantly that the community is willing to help them fix the myriad of security vulnerabilities that probably lurk beneath the surface. Scott A

Re: [FD] The OAuth2 Complete plugin for WordPress uses a pseudorandom number generator which is non-cryptographically secure (WordPress plugin)

2015-08-12 Thread Scott Arciszewski
On Wed, Aug 12, 2015 at 9:48 AM, dxw Security wrote: > Details > > Software: OAuth2 Complete For WordPress > Version: 3.1.3 > Homepage: http://wordpress.org/plugins/oauth2-provider/ > Advisory report: > https://security.dxw.com/advisories/the-oauth2-complete-plugin-for-wordpress-

[FD] Minds.com - Several Issues

2015-06-23 Thread Scott Arciszewski
to communicate privately with someone else, the solution is to use TextSecure and/or Signal. (If you aren't already using these free apps, why not?) And please, if you're going to roll your own cryptography, don't deploy it. http://www.cryptofails.com/post/75204435608/write-crypto

[FD] Tutanota Encrypted Email service - Malleable Ciphertext (AES-CBC with no MAC)

2015-06-21 Thread Scott Arciszewski
ectness of their implementations. PHP, Java, .NET, Python, you name it. Keep us in mind if you (or your employer, if applicable) needs such a service. Scott Arciszewski Chief Development Officer Paragon Initiative Enterprises <https://paragonie.com> __

[FD] 2 vulns 1 line in RNCryptor (PHP) + Call to Action

2015-06-10 Thread Scott Arciszewski
ion in other popular languages): - https://github.com/defuse/php-encryption - https://github.com/zendframework/zend-crypt Scott Arciszewski Chief Development Officer Paragon Initiative Enterprises <https://paragonie.com> ___ Sent through th

Re: [FD] Concrete5 Security Advisory - Multiple XSS Vulnerabilities - CVE-2015-2250

2015-05-13 Thread Scott Arciszewski
> > Advisory Timeline > > 05/03/2015 - First Contact > 06/05/2015 - Vulnerability fixed > 11/05/2015 - Advisory released > I'm honestly surprised it took their team two months to fix this. I've previously reported issues via HackerOne and they were on it within a day. If anyo

Re: [FD] WordPress 4.2 stored XSS

2015-04-27 Thread Scott Arciszewski
n, Apr 27, 2015 at 10:41 PM, Scott Arciszewski > wrote: > >> The author added a note on his page: http://klikki.fi/adv/wordpress2.html >> >> Also, searching HackerOne does not reveal a public WordPress program, only >> WP-API. Does this mean that WordPress was privatel

Re: [FD] WordPress 4.2 stored XSS

2015-04-27 Thread Scott Arciszewski
The author added a note on his page: http://klikki.fi/adv/wordpress2.html Also, searching HackerOne does not reveal a public WordPress program, only WP-API. Does this mean that WordPress was privately participating in HackerOne for select hackers? If so, revealing that publicly is kind of rude. :(

Re: [FD] WordPress 4.2 stored XSS

2015-04-26 Thread Scott Arciszewski
Using MySQL column truncation to trick an XSS past their filter... clever. I never would have thought to do that. :) On Sun, Apr 26, 2015 at 4:13 PM, Jouko Pynnonen wrote: > *Overview* > Current versions of WordPress are vulnerable to a stored XSS. An > unauthenticated attacker can inject JavaSc

[FD] Laravel - PHP Object Injection - 4.1, 4.2, 5.0, master

2015-04-19 Thread Scott Arciszewski
y issue I didn't find any exploitable flaws in their encryption implementation. I might look again soon. The takeaway: If any Laravel developers are reading this: If you have foregone server-side session storage, please make sure you have encryption turned on. Scott Arciszewski Chief Development Off

[FD] Slim Framework - (CVE-2015-2171, PHP Object Injection), Other Vulnerabilities

2015-03-02 Thread Scott Arciszewski
y libraries. Also, encryption is not authentication. Go play with the Matasano Crypto Challenges for more on "unauthenticated CBC mode is not secure". Thank you and good night. Scott Arciszewski P.S. If anyone is interested in learning more about writing secure PHP code, the http://www.securin

[FD] Followup on CVE-2014-6412

2015-02-12 Thread Scott Arciszewski
Since my last post, I have learned from Andrew Nacin (the lead developer of WordPress and security team member that I was corresponding with) that my emails weren't ignored, they were lost to an aggressive spam filter. Despite this, he has admitted fault for not following up on the bug report. Be

Re: [FD] Facebook Bug Bounty #23 - Session ID & CSRF Vulnerability

2015-02-11 Thread Scott Arciszewski
> > Security Risk: > == > The security risk of the security vulnerability in the facebook framework > is estimated as critical. (CVSS 9.1) > Care to run that calculation by us? On Wed, Feb 11, 2015 at 9:53 AM, Vulnerability Lab < resea...@vulnerability-lab.com> wrote: > Document Titl

[FD] CVE-2014-6412 - WordPress (all versions) lacks CSPRNG

2015-02-11 Thread Scott Arciszewski
Ticket opened: 2014-06-25 Affected Versions: ALL Problem: No CSPRNG Patch available, collecting dust because of negligent (and questionably competent) WP maintainers On June 25, 2014 I opened a ticked on WordPress's issue tracker to expose a cryptographically secure pseudorandom number generator,

Re: [FD] Go Home WP-API, You're Drunk...

2014-10-30 Thread Scott Arciszewski
eginning of the string in order to run a lenth extension attack. Cheers, Nahu.- On Tuesday, 28 October 2014, Scott Arciszewski wrote: > ... or more accurately, asleep at the wheel! >___ > _/ STO

[FD] Go Home WP-API, You're Drunk...

2014-10-28 Thread Scott Arciszewski
... or more accurately, asleep at the wheel! ___ _/ STORY TIME (feel free to skip this if you don't care) \__ |

Re: [FD] Hilariously Bad SQRL Implementation

2014-08-25 Thread Scott Arciszewski
r production, I wouldn't touch with a million foot > stick. > > > On Sun, Aug 17, 2014 at 8:22 PM, Scott Arciszewski > wrote: > > If any of you are familiar with Stephen Gibson's SQRL protocol for user > > authentication (really neat idea), you might have come a

[FD] Hilariously Bad SQRL Implementation

2014-08-18 Thread Scott Arciszewski
If any of you are familiar with Stephen Gibson's SQRL protocol for user authentication (really neat idea), you might have come across this PHP implementation before: https://github.com/geir54/php-sqrl Unfortunately, this library is actually pretty terrible. Not only does it pass all of the data of

Re: [FD] Is the era of ezine txt files over?

2014-07-19 Thread Scott Arciszewski
I linked to it earlier. You can also try https://zinesnn5qzdr6tpg.onion.to/ and https://zinesnn5qzdr6tpg.tor2web.org/ On Sat, Jul 19, 2014 at 9:20 AM, Kirk Durbin wrote: > Here is an awesome archve of said hacker ezines. Unfortunately, I don't > think there is a clearnet mirror. > > http://zine

Re: [FD] Is the era of ezine txt files over?

2014-07-10 Thread Scott Arciszewski
They still happen, just most intrusions aren't that impressive. http://chippyits5cqbd7p.onion http://zinesnn5qzdr6tpg.onion Go nuts :) On Thu, Jul 10, 2014 at 6:19 AM, wrote: > Hi, > > I am way too fresh in infosec to have seen many of the classic ezine txt > files as they first appeared, but

[FD] Xornic Contact Us Form - Captcha Bypass / XSS

2014-06-08 Thread Scott Arciszewski
Hi FD, So I got bored/felt nostalgia and decided I would go through the hotscripts website and audit the top 10 most popular PHP scripts (PHP being my most proficient language). Y'know, for practice or something. Unfortunately, there were a number of factors that frustrated this effort: * Most of

Re: [FD] What do you think of Trollc?

2014-05-29 Thread Scott Arciszewski
"Ethical" is always a matter of perspective. "Legal" and "effective" are the relevant points of contention. On Wed, May 28, 2014 at 10:29 PM, Brian M. Waters wrote: > So far the thread of discussion here has focused on whether or not > Weev's plan would /actually work/. But lets take a step bac

Re: [FD] What do you think of Trollc?

2014-05-27 Thread Scott Arciszewski
Brilliant but never going to work; it will undoubtedly gain a lot of opposition that will probably prevent it from getting off the ground. Usually through weev getting V&hammered again :( On Tue, May 27, 2014 at 2:49 PM, Philip Cheong wrote: > From https://www.startjoin.com/trollc > > *Right no

[FD] CodeIgniter <= 2.1.4 and Kohana <= 3.2.3, 3.3.2 - Timing Attacks and Object Injection

2014-05-12 Thread Scott Arciszewski
Background info and boring history shit: https://scott.arciszewski.me/research/view/php-framework-timing-attacks-object-injection Vulnerability: 1. Remote timing attack 2. PHP Object Injection 3. Possibly, as a result of 2, remote code execution Affects: - CodeIgniter (<= 2.1.4) - Kohana (<= 3.2.

[FD] DoS - Intuit QuickBase

2014-04-29 Thread Scott Arciszewski
Vendor: http://quickbase.intuit.com Intuit QuickBase sells itself as a combination database and business intelligence tool. Its performance is terrible; however, that doesn't stop some businesses from using it as the back-end for their apps. A fun fact that they don't advertise is that they limit