Re: [Full-disclosure] Geeklog = v1.6.0sr2 - Remote File Upload

2009-10-03 Thread darky

 Files with .jpg extensions can be uploaded, but these file can contain
 anything, like javascript or PHP code. Using FireFox you can upload any
 jpg extension and it will be accepted since FireFox sets the mime type
 based on file extension.

 Uploading usually requires that you first create a user account.  Once an
 account is created, you can upload a user photo, which could take advantage
 of this vulnerability.
   
Ok so this is not a remote file upload issue if you can only upload allowed 
files (not
files with bad exts), this is just a feature that doesn't valid the mime type. 
This can
help for another exploitation but you can't execute code directly at this point.

 Potential Abuse
 ===
 Executable javascript can easily be uploaded. There are several XSS holes in
 many of the Geeklog plugins which could run the uploaded javascript. If a 
 simple
 cookie stealing javascript were uploaded, it could be used to expose the 
 Geeklog
 uid and password hash which is as good as having the actual password.
   
So you just upload a JS file in order to help you with the XSS ?

 If you
 expose an administrative account, you have full access to the admin panel
 where you can set the staticpages.PHP permission to true, then create a
 static page that will run any PHP script you desire, potentially exposing
 the entire server.
   
Ok so here you have a remote code execution in the admin panel.

 Successful exploitation requires the ability to execute the uploaded 
 JavaScript.
 The Geeklog Forum program can be used as an attack vector since it does not
 properly validate many $_GET / $_POST variables.
Could you give us some more details about these XSS vulnerabilities ? :)

Cause all I see here is a RCE in the admin panel.
You confirm that there are XSS but we don't have any details about them...

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [EquipoFraude] Full Path Disclosure in most wordpress' plugins [?]

2009-10-03 Thread Zerial.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Victor Antonio Torre Villahoz wrote:
 This not only happens in the plugins, all files in wp-admin/import/ have
 errors like it.
 
 I'm fix it using:
 
 if ( defined('WP_ADMIN') or defined('WP_USE_THEMES') ){
 ;//coninue
 }
 else{
 die();
 }


I've received an email which contains a lot of files which are
vulnerables to FPD:

wp-admin/includes/admin.php
wp-admin/includes/class-ftp-pure.php
wp-admin/includes/class-ftp-sockets.php
wp-admin/includes/class-wp-filesystem-direct.php
wp-admin/includes/class-wp-filesystem-ftpext.php
wp-admin/includes/class-wp-filesystem-ftpsockets.php
wp-admin/includes/class-wp-filesystem-ssh2.php
wp-admin/includes/comment.php
wp-admin/includes/continents-cities.php
wp-admin/includes/file.php
wp-admin/includes/media.php
wp-admin/includes/misc.php
wp-admin/includes/plugin-install.php
wp-admin/includes/plugin.php
wp-admin/includes/schema.php
wp-admin/includes/template.php
wp-admin/includes/theme-install.php
wp-admin/includes/update.php
wp-admin/includes/upgrade.php
wp-admin/includes/user.php

Solution:

if ( defined('WP_ADMIN') or defined('WP_USE_THEMES') ){
;//coninue
}
else{
die(Oops! Don't run this script directly, n00b);
}
// or
if ( defined('ABSPATH')){
die(Oops! Don't run this script directly, n00b);

 
 
 Fernando A. Lagos B. escribió:
 Exists an call to add_action() without validate with function_exists().
 When I run the php script directly, I get the full path of wp installation.
 
 Example:
 [+] http://www.marco2010.cl/wp-content/plugins/akismet/akismet.php
 [+] http://www.marco2010.cl/wp-content/plugins/hello.php
 
 
 Is a bug? Is a feature?
 
 More details posted in my blog:
 http://blog.zerial.org/seguridad/vulnerabilidad-en-la-mayoria-de-los-plugins-para-wordpress/
 (spanish)
 
 
 cheers.
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 
 

- --
Fernando A. Lagos Berardi - Zerial
Desarrollador y Programador Web
Seguridad Informatica
Linux User #382319
Blog: http://blog.zerial.org
Skype: erzerial
Jabber: zer...@jabberes.org
GTalk  MSN: ferna...@zerial.org

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkrHbjMACgkQIP17Kywx9JQzBwCfX/9P2TUFi2aoqhFuMHowJw7y
oQ8AnAjwkug/QmJuYHEYJuLWz0DTiAl3
=QuHM
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploiting memory corruption vulnerabilities on Internet Explorer 8

2009-10-03 Thread yersinia
On Thu, Oct 1, 2009 at 6:44 PM, Freddie Vicious fred.vici...@gmail.comwrote:

 Yes, I am aware of the JVM and the Flash AVM heap spray techniques, no
 DEP/ASLR there... But as you said, so far there's no known catch-all
 technique against IE8.
 Along with other security features (
 http://blogs.msdn.com/architecture/archive/2009/08/13/internet-explorer-8-rated-tops-against-malware-and-phishing-attacks.aspx)
 this basicly means that IE8 is the most secure web browser nowadays?

 Depends. IMHO Non exists the more secure browser, anyway (not exists the
more secure software, never ) . But exists the more secure  env on which the
browser run. There are some difference if i run firefox in windows xp and if
i run run firefox within a selinux guest account under Fedora.

 On Thu, Oct 1, 2009 at 8:27 AM, Jared DeMott jared.dem...@harris.comwrote:

 I'm not aware of any catch-all technique just for IE8, though there are
 a few common ones like return oriented programming.  Application
 specific techniques are also common when third party extensions are
 involved.

 --
 __
 Jared D. DeMott
 Principal Security Researcher




 --
 Best wishes,
 Freddie Vicious
 http://twitter.com/viciousf

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] So weev...

2009-10-03 Thread TheLearner
I disagree.

The usage of Alleged and Likelihood (sic) are qualifiers.

Illegal criminal, however, is a double positive.

I'd like to make a break in the conversation to say that Weev loves 
is a security risk not just to government but to businesses and 
people.

Do the right thing. Submit all every last tidbit of information on 
weev to: http://tips.fbi.gov

Not at all, I'm sure!


On Sat, 03 Oct 2009 01:43:02 + dramacrat yirim...@gmail.com 
wrote:
I wouldn't be too concerned if I was weev.

A guy who uses phrases like *alleged suspect* and* likelihood 
chance* is
after him! Oh dear, he must be going to accuse weev of being an 
*illegal
criminal*!

2009/10/3 GOBBLES gobbles1...@safe-mail.net

 This is about fighting crime. Not about putting your stuff into 
the alleged
 suspect's mother.

 Please have some sense of courtesy and professionalism.

 *ISRAEL*
 Internet Sleuth, Richard Anderson,
 Electronic Lawyer


  Original Message 
 From: BMF badmotherfs...@gmail.com
 To: GOBBLES gobbles1...@safe-mail.net
 Cc: full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] So weev...
 Date: Fri, 2 Oct 2009 17:08:40 -0700


 On Fri, Oct 2, 2009 at 4:57 PM, GOBBLES gobbles1...@safe-
mail.net wrote:

 There is a strong likelihood chance we can get Andrew into 
prison for his
 criminal activity.


 Sweet! I love to send people to Federal Pound me in the ass 
Prison! While
 Bubba is fudgin' this weev character I can be fudgin' his 
momma!


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] n3td3v banned from full-disclosure mailing list

2009-10-03 Thread full-censorship
TheLearner mrxisapl...@hush.com wrote:
 This will not stand.

 The Information Security community has absolutely no tolerance for
 censorship.

where have you been for the last 10 months?

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Weev, AKA Andrew Auernheimer [Fullinfo Doc(TM) revision #1]

2009-10-03 Thread TheLearner
Eyeballing Weev, An informative dossier.
=
  By FeelTheBurn Udmncrmnl

  Version
=
  Revision #1

  Purpose
=
  You can edit this document and submit it back as a new revision.

  An effort by community citizens to expose this person. If you 
have any helpful knowledge about weev (even general) and have 
something to add, please reply with any editions.

  Abstract
=
I noticed seclists.org was taking down information relating to the 
doxing of Andrew Auernheimer. 
  - Original post 
http://seclists.org/fulldisclosure/2009/Oct/0013.html
  - Mirror (http://www.webcitation.org/5kD6O0OEd) 

  Andrew is a troll in his early 20's who has hacked into various 
websites, harasses innocent people and companies, and actually 
dropped dox on this very list. Some of his victims (Which are on a 
list too long for even his associates to remember in entirity) 
consist of Rob Levin, Rich Kyanka's (lowtax) and Kathy Sierra's 
identity theft. Also, at the request of Girlvinyl (Sherrod 
DeGrippo) weev was able to nail Randi Harper (freebsdgirl) to the 
wall, still hocking up her name on google to this day.

  Andrew wants glory. He wants to be in the news. His remedy for 
distracting attention from his own flaws and ironies is the age-old 
blame it on the jews.

  For him, he doesn't try to use it in a sarcastic way, merely 
pointing out absurb anti-semitism exists, he uses in this way to 
say something so extreme any attempt of criticizing him stops.

  In general, a puppy that wants love, but apparently can't be 
fixed. A Michael Crook.

  Real Identity
=
  - First name: Andrew
  - Last name: Auernheimer (mispelled as Aurenheimer sometimes)
  - Middle name: Alan Escher
  - Full name: Andrew Alan Escher Auernheimer

  DOB
=
  We need this!

  Past schools
=
  We need this!

  Known address
=
  Family
  2038 W Grace St
  Richmond, VA 23220 

  Criminal / 0day / Spam / Scam
  PO Box 61359 
  Sunnyvale, CA 94088

  San Francisco, Los Angeles areas of California

  You can google his PO Box address (where he does biz from) and 
see complaints about fraud.

  Known Aliases
=
  - Weev
  - Wbeelsoi
  - Uchiha Weevlos
  - Weevlar
  - Andrew wbeelsoi
  - Andrew weevlos
  - The iProhet
  - TheiProphet
  - The-iProphet

  Known Affiliations
=
  - Bantown
  - Buttes
  - EFnet #down
  - SASS (Something Awful Sycophant Squad)
  - Encyclopedia Dramatica
  - SealPac

  Known Enemies
=
  Organizations:
  - Something Awful
  - FBI
  - JDL
  - Possibly banks
  - Any law enforcement agency he knows him
  - Any jewish civil rights group that knows him

  (Know more? http://tips.fbi.gov)

  Name:
  - Dennis Fetcho
  - Kathy Sierra
  - Rob Levin
  - Richard Kyanka (lowtax)
  - FreeBSDGirl

  Known business affiliations
=
  Sealpac. Richmond, VA

  Photo
=
  - 
http://img.waffleimages.com/239fb622e4e5188627f39af8045575a70182f8c7
/569px-Internet_business.jpg / 
http://img8.imageshack.us/img8/7586/569pxinternetbusiness.jpg / 
http://imgur.com/V5hkG.jpg 

Known publicity stunts
=
  - Toorcon2111, Cybercrime
  Full URL: http://video.google.com/videoplay?docid=-
5643217366887354926ei=iOzHSvzBOpbWrQKvlu2KDgq=andrew+wbeelsoi
  TinyURL: http://tinyurl.com/auernheimercrime
  - LiveJournal hacking
  - NYTimes Mawebulence Expose
  Full URL: http://www.nytimes.com/2008/08/03/magazine/03trolls-
t.html?_r=1hporef=slogin
  Tiny URL: http://tinyurl.com/auernheimernytimes
  - He is also taking credit for Amazon hack of 2009. However this 
has not been confirmed
  - Corrupt: www.corrupt.org/act/interviews/weev
  - Public naming by JewishReview
  Full URL: http://www.jewishreview.org/local/Police-question-
two-men-about-threats-to-Jewish-community
  TinyURL: http://tinyurl.com/auernheimer
  Archival: http://www.webcitation.org/5jnPBPyHG 
  Family
===
  Phone number: (804) 355-2889

  Mother
- Name: Catherine Auernheimer
- Affiilations: Richmond PTA, Democratic Party
- Alias: Alyse
- Photograph: http://imgur.com/AQpSd.jpg / 
(http://img19.imageshack.us/img19/1967/aqpsd.jpg) / 
(http://img.waffleimages.com/41c1f9036d350871dbedf177ffd1109cf3bc6ab
8/aqpsd.jpg) / (http://hosting11.imagecross.com/image-hosting-th-
16/953aqpsd.jpg) / 
(http://www.freeimagehosting.net/uploads/af64fe986f.jpg) / 
(http://www.uploadgeek.com/thumb-CA81_4AC55843.jpg) / 
(http://www.imagehuge.com/out.php/t16155_aqpsd.jpg) / 
(http://images.imagenonline.com/img_a190867.jpg) / 
(http://www.desiupload.com/out.php/t325733_aqpsd.jpg) 

  Father
- Name: Mark Auernheimer
- Affiliations: SealPac
- Photograph: http://imgur.com/CEaNX.jpg / 

Re: [Full-disclosure] Weev, AKA Andrew Auernheimer [ Fullinfo Doc(TM) revision #1]

2009-10-03 Thread TheLearner
Ah, pardon then. Didn't mean to insult the intelligence community.

On Sun, 04 Oct 2009 01:53:43 + full-censors...@hushmail.com 
wrote:
TheLearner mrxisapl...@hush.com wrote:
  Andrew is a troll in his early 20's who has hacked into various
 websites, harasses innocent people and companies

Have you never had a parking ticket or a telling off by the school 

mistress for smoking pot behind the bike shed?

There are criminals everywhere, who do *bad* things, you trying to 

appeal to the FBI on an international mailing list, where the main 

concern is *cyber terrorism* isn't the way to go.

If you have a complaint about this stuff contact your local law 
enforcement office.

Nobody gives a fuck here, we're all counter-terrorism folks.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploiting memory corruption vulnerabilities on Internet Explorer 8

2009-10-03 Thread Freddie Vicious
Yeah that's prrety obvious that there's one way or another to bypass DEP and
ASLR but if you chose not to share it and don't have anything useful to say,
it'll be better not to say anything.

On Thu, Oct 1, 2009 at 12:55 PM, Berend-Jan Wever
berendjanwe...@gmail.comwrote:

 FYI: ASLR  DEP can be bypassed on x86, there's just nothing public at the
 moment.

 Cheers,

 SkyLined

 Berend-Jan Wever berendjanwe...@gmail.com
 http://skypher.com/SkyLined




   On Thu, Oct 1, 2009 at 6:44 PM, Freddie Vicious 
 fred.vici...@gmail.comwrote:

   Yes, I am aware of the JVM and the Flash AVM heap spray techniques, no
 DEP/ASLR there... But as you said, so far there's no known catch-all
 technique against IE8.
 Along with other security features (
 http://blogs.msdn.com/architecture/archive/2009/08/13/internet-explorer-8-rated-tops-against-malware-and-phishing-attacks.aspx)
 this basicly means that IE8 is the most secure web browser nowadays?

  On Thu, Oct 1, 2009 at 8:27 AM, Jared DeMott jared.dem...@harris.comwrote:

 I'm not aware of any catch-all technique just for IE8, though there are
 a few common ones like return oriented programming.  Application
 specific techniques are also common when third party extensions are
 involved.

 --
 __
 Jared D. DeMott
 Principal Security Researcher




 --
 Best wishes,
 Freddie Vicious
 http://twitter.com/viciousf

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/





-- 
Best wishes,
Freddie Vicious
http://twitter.com/viciousf
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] n3td3v mentioned in a book?

2009-10-03 Thread full-censorship
if this guy is mentioned in a book and we banned him?

http://f0rb1dd3n.com/links.php

i'm calling for a serious review of whats going on with the ban 
list.








___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/