Re: [FD] [RT-SA-2016-001] Padding Oracle in Apache mod_session_crypto

2016-12-27 Thread Tim
instead be pointing developers in the direction of using something off-the-shelf, such as libsodium. Much less room for error. tim ___ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/

Re: [FD] [RT-SA-2016-001] Padding Oracle in Apache mod_session_crypto

2016-12-30 Thread Tim
nearly as easy to expose (usually only minor block-level information leaks). In the real world I see these kinds of mistakes all of the time. So be careful of steering people toward a mode that doesn't degrade as gracefully when developers make mistakes. They invariably will do so, unless they'v

Re: [FD] Audit: don't only focus on heartbleed issue

2014-04-16 Thread Tim
the world can hijack your DNS resolver[1]. The dividing line between "internal network" and the Internet is becoming fuzzier every day. It is getting easier to get inside and yet everyone still seems to run an unsegmented internal "trusted" network. tim 1. http://arstechnica.

Re: [FD] [ANN] Struts 2 up to 2.3.16.1: Zero-Day Exploit Mitigation (security | critical)

2014-04-25 Thread Tim
application defines as relevant. Until then, I'm recommending to my clients that they avoid Struts like the plague. tim 1. http://seclists.org/fulldisclosure/2014/Mar/53 On Thu, Apr 24, 2014 at 05:37:13PM +0200, Rene Gielen wrote: > In Struts 2.3.16.1, an issue with ClassLoader man

Re: [FD] [ANN] Struts 2 up to 2.3.16.1: Zero-Day Exploit Mitigation (security | critical)

2014-04-25 Thread Tim
hen don't you also need to check for "^Request...", "^Session...", "^Struts...", and so on? Or is it actually case insensitive and you're just being unnecessarily careful with "class"? Also: Thought about unicode lately? tim PS- yes, I'm too

Re: [FD] [ANN] Struts 2 up to 2.3.16.1: Zero-Day Exploit Mitigation (security | critical)

2014-04-25 Thread Tim
just fingerpointing, he/she is heartly welcome! Something that doesn't allow you to directly call methods, and only allows you to access properties on objects explicitly defined by the app developer. Keep the syntax similar if you like, but chuck the reflection. Data is data. Code is code. Keep them separate. tim ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/

Re: [FD] Critical bash vulnerability CVE-2014-6271

2014-09-25 Thread Tim
he #! header. (I notice some dhclient shell script hooks don't make an explicit reference at all, while others reference /bin/sh.) tim 1. Under Debian/Ubuntu, 'sudo apt-get install dash' and saying "yes" at the prompt can quickly accomplish this. ___

Re: [FD] McAfee ePolicy Orchestrator Authenticated XXE and Credential Exposure

2015-01-12 Thread Tim
Invest more in up-front security testing and Q/A, so they aren't shipping vulnerable code to begin with. C. Do both A and B Preventing these bugs isn't black magic. It isn't rocket surgery. It's just a matter of getting business leaders to care about shipping quality code.

Re: [FD] Xamarin for Android <5.1 DLL Hijack Vulnerability

2015-05-19 Thread Tim
Thanks for posting this to FD, these didn't even include it in their release notes; http://developer.xamarin.com/releases/android/xamarin.android_5/xamarin.android_5.1/ Was there a bug reported in bugzilla to link back too? -Tim Strazzere On Tue, May 19, 2015 at 6:49 AM, ValdikSS

Re: [FD] Xamarin for Android <5.1 DLL Hijack Vulnerability

2015-05-19 Thread Tim
Isn't this the public bug tracker? https://bugzilla.xamarin.com/describecomponents.cgi?product=Android Though, correct that case id doesn't map to anything there. -Tim Strazzere On Tue, May 19, 2015 at 2:32 PM, ValdikSS wrote: > They don't have public bugtracker. Case ID

[FD] Hard-coded credentials on ProGrade/Lierda Grill Temperature Monitor [CVE-2019-15304]

2019-08-25 Thread tim
[Author:] Tim Tepatti [Website:] tepatti.com [Title:] Hard-coded credentials on ProGrade/Lierda Grill Temperature Monitor [CVE-2019-15304] [Product:] Grill Temperature Monitor [Manufacturer:] ProGrade / Lierda [Affected Version(s):] V1.00_50006 [Tested Version(s):] V1.00_50006 [Vulnerability

Re: [FD] Anhui Huami Mi Fit Android Application - Unencrypted Update Check

2019-11-29 Thread Tim
What's the issue here exactly? An attacker can just prevent an the in app update check from realizing it needs to nag the user? The actual update logic and update-ability is controlled through the Play Store, no? -Tim Strazzere On Tue, Nov 26, 2019 at 10:27 AM David Coomber < davidcoom

[FD] Sicherheitslücke - Liferay Portal Enterprise Edition

2015-10-05 Thread Tim Schughart
ver name Value for ldap server name field: Name_of_ldap_serveralert("XSS") The script is inserted to the configuration page persistent until the ldap server is deleted from database again. Best regards / Mit freundlichen Grüßen Tim Schughart CEO | IT Security specialist ProSec Net

[FD] Persistent XSS - Liferay Portal Enterprise Edition

2015-10-05 Thread Tim Schughart
ver name Value for ldap server name field: Name_of_ldap_serveralert("XSS") The script is inserted to the configuration page persistent until the ldap server is deleted from database again. Best regards / Mit freundlichen Grüßen Tim Schughart CEO | IT Security specialist ProSec Net

[FD] Persistent XSS in Abus Security Center - CVSS 8.0

2016-09-29 Thread Tim Schughart
not patch the vuln. Fixed versions: - Researcher credits: Tim Schughart & Khanh Quoc Pham of ProSec Networks Vendor notification: 2016-09-21 Solution date: Public disclosure: 2016-09-29 CVE reference: CVSSv3: 8.0 AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H <https://nvd.nist.gov/cvss/v3-cal

[FD] Multiple exposures in Sophos UTM

2016-09-30 Thread Tim Schughart
(not tested) Vulnerable component: Frontend Report confidence: yes Solution status: Not fixed by Vendor, no further responses from vendor. Fixed versions: - Researcher credits: Tim Schughart & Khanh Quoc Pham of ProSec Networks Vendor notification: 2016-09-01 Solution date: - Public disclosure

[FD] Critical Vulnerability in Ubiquiti UniFi

2016-09-30 Thread Tim Schughart
sions affected (not tested) Vulnerable component: Database Report confidence: yes Solution status: Not fixed by Vendor, the bug is a feature. Fixed versions: - Researcher credits: Tim Schughart, Immanuel Bär, Khanh Quoc Pham of ProSec Networks Solution date: - Public disclosure: 2016-09-3

Re: [FD] Critical Vulnerability in Ubiquiti UniFi

2016-10-03 Thread Tim Schughart
to the ap. Best regards Tim Schughart > Am 01.10.2016 um 15:30 schrieb Carlos Silva : > > Hi Tim! > > I can be missing something here but I just checked this on a fresh installed > Unifi Controller and mongod is binding to localhost making this a non-issue. > Or, you

[FD] Ubiquiti

2016-10-19 Thread Tim Schughart
:U/C:H/I:H/A:H Do you agree? I’m looking forward to minimize our "race time condition denial of service", to deliver fast results in future :-P Best regards / Mit freundlichen Grüßen Tim Schughart CEO / Geschäftsführer -- ProSec Networks e.K. Ellingshohl 82 56076 Kobl

Re: [FD] heartbleed OpenSSL bug CVE-2014-0160

2014-04-08 Thread Tim Schütt
Nope, works also on other protocols like IMAPS. Am 08.04.2014 15:30, schrieb Chris Schmidt: > The bug is in the TLS implementation in OpenSSL, you will only see it on > https > > Sent from my iPhone > >> On Apr 8, 2014, at 4:43 AM, "Nik Mitev" wrote: >> >> I used the tool Kirils linked (http:/

Re: [FD] ldd for OS X WAS:Auditing systems for vulnerable 3rd-party OpenSSL (Gabriel Brezi)

2014-04-17 Thread Tim Heckman
enSSL for one reason or another. Cheers! -Tim --- Tim Heckman Operations Engineer PagerDuty, Inc. [1] http://brew.sh/ [2] bind curl curl ejabberd elinks git imapfilter ircd-hybrid irssi ldns lftp liblacewing libssh2 libtorrent-rasterbar lynx midnight-commander mongodb monkeysphere mosquitto mut

[FD] Parallels Plesk Panel 12.x & 11.x /etc/psa/private/secret_key leakage

2014-04-22 Thread Tim Rots
'))).hexdigest() print whoops -- In theory this bug will give you enough ammunition to calculate the contents of the /etc/psa/private/secret_key as we have part of the salt, and already know the outcome of a insecure hashing algorithm to match against. I'm glad nobod

[FD] Forminator 1.5.4 - Unauthenticated Persistent XSS, Blind SQL Injection (WordPress Plugin)

2019-02-05 Thread Tim Coen
/2018 * Public Disclosure: 02/05/2019 * Credit: Tim Coen ## Unauthenticated Persistent XSS via poll # CVSS 7.2 High [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N) # Details Custom fields of a poll

[FD] Quiz And Survey Master 6.0.4 - Reflected XSS (WordPress Plugin)

2019-02-05 Thread Tim Coen
/2019 * Credit: Tim Coen # CVSS 6.1 Medium [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) # Overview The Quiz And Survey Master WordPress plugin is vulnerable to reflected XSS as it echoes the quiz_id

[FD] Blog2Social 5.0.2 - Reflected XSS (WordPress Plugin)

2019-02-05 Thread Tim Coen
* Credit: Tim Coen # CVSS 6.1 Medium [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) # Overview The Blog2Social WordPress plugin is vulnerable to reflected XSS as it echoes the b2s_update_publish_date

[FD] Contact Form Email 7.10.41 - Reflected XSS & CSRF (WordPress Plugin)

2019-02-05 Thread Tim Coen
blic Disclosure: 02/05/2019 * Credit: Tim Coen ## Reflected XSS # CVSS 6.1 Medium [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) # Overview The Contact Form Email WordPress plugin is vulnerabl

[FD] Font_Organizer 2.1.1 - Reflected XSS (WordPress Plugin)

2019-02-05 Thread Tim Coen
* Credit: Tim Coen # CVSS 6.1 Medium [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) # Overview The Font_Organizer WordPress plugin is vulnerable to reflected XSS as it echoes the manage_font_id parameter

[FD] Give 2.3.0 - Reflected XSS (WordPress Plugin)

2019-02-05 Thread Tim Coen
* Vulnerability: XSS * Affected Software: [Give](https://wordpress.org/plugins/give/) * Affected Version: 2.3.0 * Patched Version: 2.3.1 * CVE: not requested * Risk: Medium * Vendor Contacted: 11/24/2018 * Vendor Fix: 12/13/2018 * Public Disclosure: 02/05/2019 * Credit: Tim

[FD] KingComposer 2.7.6 - Reflected XSS (WordPress Plugin)

2019-02-05 Thread Tim Coen
: Tim Coen # CVSS 6.1 Medium [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) # Overview The KingComposer WordPress plugin is vulnerable to reflected XSS as it echoes the id parameter without proper

[FD] NextScripts: Social Networks Auto-Poster 4.2.7 - Reflected XSS (WordPress Plugin)

2019-02-05 Thread Tim Coen
* Vendor Fix: 11/02/2018 * Public Disclosure: 02/05/2019 * Credit: Tim Coen # CVSS 6.1 Medium [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) # Overview The Social Networks Auto-Poster WordPress

[FD] wpGoogleMaps 7.10.41 - Reflected XSS (WordPress Plugin)

2019-02-05 Thread Tim Coen
/2019 * Credit: Tim Coen # CVSS 6.1 Medium [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) # Overview The wpGoogleMaps WordPress plugin is vulnerable to reflected XSS as it echoes PHP_SELF without

[FD] WP Live Chat Support 8.0.17 - Reflected XSS (WordPress Plugin)

2019-02-05 Thread Tim Coen
/05/2019 * Credit: Tim Coen # CVSS 6.1 Medium [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) # Overview The WP Live Chat Support WordPress plugin is vulnerable to reflected XSS as it echoes the term

[FD] YOP Poll 6.0.2 - Reflected XSS (WordPress Plugin)

2019-02-05 Thread Tim Coen
: Tim Coen # CVSS 6.1 Medium [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) # Overview The YOP poll WordPress plugin is vulnerable to reflected XSS as it echoes the poll_id parameter without proper

[FD] Multiple banks - potential risk of an inconsequent client separation

2019-08-09 Thread Tim Schughart
out this? Best regards / Mit freundlichen Grüßen Tim Schughart CEO / Geschäftsführer -- ProSec GmbH Robert-Koch-Straße 1-9 56751 Polch Website: https://www.prosec-networks.com Phone: +49 (0)261 450 930 90 Sitz der Gesellschaft / company domiciled in: Polch Registergericht / re