[FD] IPSwitch IMail Server WEB client 12.4 persistent XSS

2014-06-04 Thread fulldisclosure
# Exploit Title: IPSwitch IMail Server WEB client 12.4 persistent XSS # Date: 3 june 2014 # Exploit Author: Peru (GoSecure!) # Vendor Homepage: www.ipswitch.com # Software Link: http://www.imailserver.com/try/ # Version: Tested on 12.3 and 12.4 before 12.4.1.15 # Tested on: WindowsServer2008R

Re: [FD] [oss-security] Bug in bash <= 4.3 [security feature bypassed]

2014-06-04 Thread Jose Carlos Luna Duran
In my opinion the drop of privs in bash was mostly a "help" measure for poorly written setuid programs executing system() calls. I don't think is the role of bash to do this as the problem that could be exploited by that would really be in the original program that does not drop privs before invoki

[FD] More /tmp fun (PHP, Lynis)

2014-06-04 Thread A B
After reading about today's "Check, rootkit" vulnerability (CVE-2014-0476), I thought I'd share these stupid bugs: BUG #1 - PHP's ./configure script writes a predictable filename to /tmp allowing for a symlink attack against the user running the script >From PHP 5.5.13: 18045 #include 18046 i

[FD] Linksys E4200 Authentication Bypass

2014-06-04 Thread Jordan Bradley
https://phra.gs/blob/2014-06-04-linksys-e4200-auth-bypass.html - - Jordan Bradley ph...@phra.gs https://keybase.io/phrag ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://secli

Re: [FD] TrueCrypt?

2014-06-04 Thread Dave Warren
On 2014-06-03 04:09, Dave Howe wrote: The issue we have with the current TC builds is that they are not reproducible. The source code is available online, and is in the process of being audited, but there is no guarantee the installer almost all the users have installed TC with contained code ac