Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Pedro Ribeiro
On 16 Mar 2014 23:36, T Imbrahim timbra...@techemail.com wrote: The thread read Google vulnerabilities with PoC. From my understanding it was a RFI vulnerability on YouTube, and I voiced my support that this is a vulnerability. I also explained a JSON Hijacking case as a follow up, and you

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-17 Thread Pedro Ribeiro
/?l=full-disclosurem=139076233105401w=2 2014-03-17 10:24 GMT+01:00 Pedro Ribeiro ped...@gmail.com: On 16 Mar 2014 23:36, T Imbrahim timbra...@techemail.com wrote: The thread read Google vulnerabilities with PoC. From my understanding it was a RFI vulnerability on YouTube, and I voiced

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Pedro Ribeiro
On 13 Mar 2014 14:30, Nicholas Lemonias. lem.niko...@googlemail.com wrote: I suggest you to read on Content Delivery Network Architectures . YouTube.com populates and distributes stored files to multiple servers through a CDN (Content Delivery Architecture), where each video uses more than

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-13 Thread Pedro Ribeiro
Keep in mind that YouTube allows files to be uploaded by definition. What you have achieved is upload a file for an extension type that is not allowed. It is definitely a vulnerability but a low risk one since you haven't demonstrated if it has any ill effects. Can you somehow find the URL to

[Full-disclosure] [CVE-2014-0334] XSS in CMS made simple, plus other security issues

2014-03-04 Thread Pedro Ribeiro
out there that have a decent attitude towards security. Steer well clear of this one. Regards Pedro Ribeiro Agile Information Security ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted

[Full-disclosure] [CVE-2014-2027] PHP objection insertion / arbitrary file deletion / possible RCE in egroupware = 1.8.005

2014-02-20 Thread Pedro Ribeiro
Hi Egroupware = 1.8.005 contains a PHP object insertion vulnerability via unsafe use of the unserialize() function. There are lots of classes with magic methods which appear to be exploitable, some of them possibly for remote code execution. The advisory linked below contains an example of an

[Full-disclosure] [CVE-2014-1860] PHP object insertion / possible RCE in Contao CMS = 3.2.4

2014-02-04 Thread Pedro Ribeiro
for being so responsive. The full report can be found at my repo in https://github.com/pedrib/PoC/blob/master/contao-3.2.4.txt Regards, Pedro Ribeiro Agile Information Security ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk

[Full-disclosure] [CVE-2014-1836] Arbitrary file deletion in ImpressCMS 1.3.6 and two XSS issues

2014-02-04 Thread Pedro Ribeiro
. The full report can be seen at my repo https://github.com/pedrib/PoC/blob/master/impresscms-1.3.5.txt Thanks in advance, and thanks to the ImpressCMS team for being so responsive. Regards, Pedro Ribeiro Agile Information Security ___ Full-Disclosure - We

[Full-disclosure] [CVE-2013-6040] MW6 Technologies ActiveX buffer overflows and remote code execution

2014-01-22 Thread Pedro Ribeiro
be obtain from my repository at https://github.com/pedrib/PoC in the folder mw6. Regards, Pedro Ribeiro Director of Research Agile Information Security ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure

[Full-disclosure] [CVE -2014-1201] Lorex security DVD ActiveX control buffer overflow

2014-01-10 Thread Pedro Ribeiro
/pedrib/PoC/lorexActivex/lorex-testcase.html Regards, Pedro Ribeiro (ped...@gmail.com) Agile Information Security ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http

Re: [Full-disclosure] [CVE -2014-1201] Lorex security DVD ActiveX control buffer overflow

2014-01-10 Thread Pedro Ribeiro
Can't seem to get github links to work, just go to the PoC repo and navigate from there if you are interested in seeing the files. On 9 Jan 2014 16:55, Pedro Ribeiro ped...@gmail.com wrote: Hi, I have discovered a buffer overflow vulnerability that allows remote code execution in an ActiveX