# Exploit Title: IPSwitch IMail Server WEB client 12.4 persistent XSS
# Date: 3 june 2014
# Exploit Author: Peru (GoSecure!)
# Vendor Homepage: www.ipswitch.com
# Software Link: http://www.imailserver.com/try/
# Version: Tested on 12.3 and 12.4 before 12.4.1.15
# Tested on: WindowsServer2008R
In my opinion the drop of privs in bash was mostly a "help" measure
for poorly written setuid programs executing system() calls. I don't
think is the role of bash to do this as the problem that could be
exploited by that would really be in the original program that does
not drop privs before invoki
After reading about today's "Check, rootkit" vulnerability (CVE-2014-0476),
I thought I'd share these stupid bugs:
BUG #1 - PHP's ./configure script writes a predictable filename to /tmp
allowing for a symlink attack against the user running the script
>From PHP 5.5.13:
18045 #include
18046 i
https://phra.gs/blob/2014-06-04-linksys-e4200-auth-bypass.html
- -
Jordan Bradley
ph...@phra.gs
https://keybase.io/phrag
___
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://secli
On 2014-06-03 04:09, Dave Howe wrote:
The issue we have with the current TC builds is that they are not
reproducible.
The source code is available online, and is in the process of being
audited, but there is no guarantee the installer almost all the users
have installed TC with contained code ac