Re: PHP Nuke = 8.0.0.3.3b SQL Injections and Bypass SQL Injection Protection vulnerabilities

2007-04-18 Thread Paul Laudanski
[EMAIL PROTECTED] wrote: PHP Nuke = 8.0.0.3.3b SQL Injections and Bypass SQL Injection Protection vulnerabilities PROGRAM: PHP-Nuke HOMEPAGE: http://phpnuke.org/ VERSION: All version BUG: PHP Nuke = 8.0.0.3.3b Bypass SQL Injection Protection and SQL Injections

Re: Php Nuke POST XSS on steroids

2007-03-13 Thread Paul Laudanski
ascii wrote: Paul Laudanski wrote: I tried both your scripts at a few locations, and all I get back is this [cut] hi Paul, long time from ccc : ) Hey sure how are you? Been well? I've been really busy with CC. it happens because http headers must be on a single line, it's

Re: Php Nuke POST XSS on steroids

2007-03-12 Thread Paul Laudanski
ascii wrote: Php Nuke POST XSS on steroids Name Php Nuke POST XSS on steroids Systems Affected PHP =4.0.7 =5.2.1, GLOBALS OFF, Php Nuke 8.0 and others (partially verified) Severity Medium Vendorhttp://php nuke.org/ Advisory

Re: PHP-Nuke = 8.0 Cookie Manipulation (lang)

2007-03-12 Thread Paul Laudanski
{ / Best Regards Aleksandar Programmer and Web Developer /// Building on your patch you'd want to incorporate basename(). You never want to accept directory traversal attempts into variables. Paul Laudanski

Re: how to trick most of cms avatar upload filter [exemple for : RunCms (PoC)]

2006-11-04 Thread Paul Laudanski
This is an issue reported months ago already with mixed results from vendors. Only way to get them to patch are to issue exploits like this unfortunately. Paul Laudanski, Microsoft MVP Windows-Security Phish XML Feed: http://www.castlecops.com/article6619.html Phish Takedown: http

CC announces new Rootkit help forum insync with Book

2006-07-10 Thread Paul Laudanski
http://www.castlecops.com/a6621-CastleCops_Announces_New_Rootkit_Help_Forum.html -- Paul Laudanski, Microsoft MVP Windows-Security Submit Phish: www.castlecops.com/pirt Phish XML Feed: www.castlecops.com/article6619.html [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http

Re: PHP-Nuke = 7.9 Search XSS Vulnerability

2006-06-13 Thread Paul Laudanski
onload=alert(document.cookie) // You'll get a javascript alert with your cookie in it. # Credits: O.G. -- Paul Laudanski, Microsoft MVP Windows-Security Report phish: http://castlecops.com/pirt [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com

Re: phpBB2 (template.php) Remote File Inclusion

2006-06-06 Thread Paul Laudanski
not a phpbb native product? Proper disclosures please. -- Paul Laudanski, Microsoft MVP Windows-Security Submit Phish: http://castlecops.com/pirt [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com [family] http://cuddlesnkisses.com

Re: PHPBB 2.0.20 persistent issues with avatars

2006-05-20 Thread Paul Laudanski
On Mon, 15 May 2006, s89df987 s9f87s987f wrote: you misunderstanding the usage rgod has communicated with me offlist at that time and I understand the issue. -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http

Re: PHPBB 2.0.20 persistent issues with avatars

2006-05-15 Thread Paul Laudanski
a POC? sources: http://www.zend.com/manual/ref.exif.php http://us2.php.net/exif http://www.php.net/image -- Paul Laudanski, Microsoft MVP Windows-Security Submit phish: http://castlecops.com/pirt [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com

Re: phpBB 2.0.20 Full Path Disclosure and SQL Errors

2006-05-12 Thread Paul Laudanski
. If you're running a website, the first thing you have to do is secure the daemons on it. And that includes disabling the displaying of errors, disabling debugging, etc. -- Paul Laudanski, Microsoft MVP Windows-Security Submit Phish: http://castlecops.com/pirt [de] http://de.castlecops.com [en

Re: modules name(Downloads)SQL Injection Exploit

2006-05-10 Thread Paul Laudanski
] -- Paul Laudanski, Microsoft MVP Windows-Security Submit phish: www.castlecops.com/pirt [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com

Re: phpBB 2.0.20 Full Path Disclosure and SQL Errors

2006-05-10 Thread Paul Laudanski
SecurityReason.Com -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2.2 (FreeBSD) iD8DBQFEW4pi3Ke13X/fTO4RAqV7AJ9PeZ9nbRUYATqArEzLOdenG1ypHwCguPa5 7DlqP3M3vq1frb7Zc3y+KrU= =4U6Y -END PGP SIGNATURE- -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http

Aluria/WhenU Troubled Past and Whitewashing History

2006-03-09 Thread Paul Laudanski
and skirting the foundational questions at hand wrt the WhenU history deletion. -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com [family] http://cuddlesnkisses.com

Re: PHP-based CMS mass-exploitation

2006-03-08 Thread Paul Laudanski
, or at the least Mambo needs to fix their code. We need to stop phishers taking advantage of what appears to be a Mambo weakness in its caching. -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com [family] http

RE: Amazon phishing scam on Yahoo servers

2006-02-23 Thread Paul Laudanski
of the people registering some of these domains, I have seen a few who were famous for one reason or another. I wonder if it's possible to register a domain with the name George W Bush or F. Castro.. Cheers Geoff Vass -Original Message- From: Paul Laudanski [mailto:[EMAIL PROTECTED

Amazon phishing scam on Yahoo servers

2006-02-21 Thread Paul Laudanski
before they open back up. Assessment: http://castlecops.com/a6531-Amazon_phishing_scam_on_Yahoo_servers.html -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com [family] http://cuddlesnkisses.com

Re: Re: Vulnerabilities in vBulltin(3.0.7 - 3.5.3) and IPB(2.0.0 - 2.1.4).

2006-02-17 Thread Paul Laudanski
that a week ago. Jelsoft already responded saying they aren't playing into this game. You just don't give in to terror. -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com [family] http

Re: Vulnerabilities in vBulltin(3.0.7 - 3.5.3) and IPB(2.0.0 - 2.1.4).

2006-02-07 Thread Paul Laudanski
to sell this? The People cash, for safe code if him all time to point to errors that they will not learn nor that! And additionally me not advantageously that they have quickly heard problem ;) All about the cash? Where is your ethics? -- Paul Laudanski, Microsoft MVP Windows-Security [de] http

PayPal Phishing Site Exploits Google XSS Vulnerability

2006-01-14 Thread Paul Laudanski
details and watch the entire captured video of this scam here: http://castlecops.com/a6460-PayPal_Phishing_Site_Exploits_Google_XSS_Vulnerability.html ( short: http://castlecops.com/article-6460-nested-0-0.html ) -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http

Re: WMF Exploit

2006-01-04 Thread Paul Laudanski
://castlecops.com/postlite143213-.html -- Paul Laudanski, Microsoft MVP Windows-Security [cal] http://events.castlecops.com [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com [family] http://cuddlesnkisses.com

phpbb2.0.19 fixes security issues

2005-12-30 Thread Paul Laudanski
not having the zlib extension enabled [Change] Placed version information above who is online in admin panel for better visual presence -- Paul Laudanski, Microsoft MVP Windows-Security [cal] http://events.castlecops.com [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http

Re: WMF Exploit

2005-12-30 Thread Paul Laudanski
; classtype:attempted-user; reference:url,www.frsirt.com/english/advisories/2005/3086; sid:2002733; rev:1;) Simply add it to Sunbelt Kerio's bad-traffic.rlk file, or download it: http://castlecops.com/p687296-.html#687296 -- Paul Laudanski, Microsoft MVP Windows-Security [cal] http

Re: XSS bypass in PHPNuke - FIX ?

2005-12-21 Thread Paul Laudanski
anything with it like displaying the query back to the user. -- Paul Laudanski, Microsoft MVP Windows-Security [cal] http://events.castlecops.com [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com [family] http://cuddlesnkisses.com

Re: Bypass XSS filter in PHPNUKE 7.9=x

2005-12-17 Thread Paul Laudanski
is if the admin's account gets hijacked, there is no code to prevent admin from instantiating a malformed request or post. XSS, CRSF, you name it... -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com [family] http

Re: WebCalendar Multiple Vulnerabilities

2005-12-02 Thread Paul Laudanski
. Your timing of vendor notice and vul'n release are fast unfortunately. Taking a look, simple functions in PHP can be called upon to fix those issues. Thanks for reporting them. -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http

Sunbelt set to acquire Kerio Personal Firewall

2005-12-01 Thread Paul Laudanski
http://sunbeltblog.blogspot.com/2005/12/we-liked-product-so-much-we-bought-it.html And Kerio lives on... -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com [family] http://cuddlesnkisses.com

Re: Xaraya = 1.0.0 RC4 D.O.S / file corruption

2005-11-30 Thread Paul Laudanski
other things. -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com

Malware Removal and Prevention Procedure

2005-11-14 Thread Paul Laudanski
...): http://castlecops.com/a6341-Malware_Removal_and_Prevention_Procedure.html -- Paul Laudanski, Microsoft MVP Windows-Security [de] http://de.castlecops.com [en] http://castlecops.com [wiki] http://wiki.castlecops.com

Re: phpBB 2.0.17 (and other BB systems as well) Cookie disclosure exploit.

2005-10-29 Thread Paul Laudanski
On Tue, 25 Oct 2005, Tatercrispies wrote: On 10/25/05, Paul Laudanski [EMAIL PROTECTED] wrote: Anyone have other ideas on this? I've already implemented some code to validate file input and its working. But is this the right approach? Since it is an IE issue, you may as well