[FD] Files.com - Auth Bypass (Fat Client)

2021-01-06 Thread Balázs Hambalkó
Hi,

Vendor: Files.com
Product: Fat Client
Tested version: 3.3.6 but newer version high likely also affected
Credit: Balazs Hambalko, IT Security Consultant


This vulnerability was identified and reported promptly to the vendor in
April 2020.
The answer was they do not see any risk here.

Anyway I would like to share my POC video, only for learning purposes.

According to the vendor, there is no risk here, on the other hand, I built
up a playground and being a Domain Admin I could gain normal user's
Files.com storage access.

Personally I do not recommend using this solution in an environment where
somebody can access your C drive (using Windows Domain or common machines -
library, net coffee, and so on...)

POC: https://youtu.be/Ay_iYFtPrcs

Kind regards,
Balazs Hambalko

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Roundcube issue - Auth bypass via Improper Session Management

2020-09-01 Thread Balázs Hambalkó
Hi,

Title: Authentication bypass via Improper Session Management

Product: RoundcubeMail
Tested version:  1.4.4 - 1.4.8

CVE: in progress
Credit: Balazs Hambalko, IT Security Consultant


Risk: The lack of proper session validation could lead an attacker to
access the victim user's emails.

Issue fixed: in next release

URL:
https://github.com/roundcube/roundcubemail/issues/7576

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Gigamon - GigaVUE 0day

2020-04-28 Thread Balázs Hambalkó
Hi,

An issue was discovered in Gigamon GigaVUE 5.5.01.11.
The upload functionality allows an authenticated user to change the
filename value (in the POST method) from the original filename
to achieve directory traversal via a ../ sequence and, for example,
obtain a complete directory listing of the machine.

--

[Additional Information]
This vulnerability aid the attacker in discovering the whole file
system in the underlying host system - including identifying the
writeable and read-only file systems.

The authenticated user needs to use the upload functionality. The POST
HTTP verb is being used which needs to be intercepted, and modified
(the "filename" parameter must be manipulated in the POST body
section)

These vulnerabilities were reported to the vendor. They said this
version will be decommissioned in 2023 and they decided not to provide
technical support anymore. In other words, they will not fix any IT
Security Issues which have lower than critical risk. This
version is in production in enterprise environments, and will be
available until end of 2023, so the impact is real.

--

[Vulnerability Type]
Directory Traversal

--

[Vendor of Product]
Gigamon

--

[Affected Product Code Base]
GigaVUE - 5.5.01.11

--

[Affected Component]
Upload functionality

--

[Attack Type]
Remote

--

[Impact Information Disclosure]
true

--

[Attack Vectors]
The authenticated user needs to use the upload functionality. The POST
HTTP verb is being used which needs to be intercepted, and modified
(the "filename" parameter must be manipulated in the POST body
section)

--

[Reference]https://www.gigamon.com/products/access-traffic/physical-nodes.html

--

[Has vendor confirmed or acknowledged the vulnerability?]
true

--

[Discoverer]
Balazs Hambalko, IT Security Consultant

Use CVE-2020-12251.



An issue was discovered in Gigamon GigaVUE 5.5.01.11. The upload
functionality allows an arbitrary file upload for an authenticated
user. If an executable file is uploaded into the www-root directory,
then it could yield remote code execution via the filename parameter.

--

[Additional Information]
These vulnerabilities were reported to the vendor. They said this
version will be decommissioned in 2023 and they decided not to provide
technical support anymore. In other words, they will not fix any IT
Security Issues which have lower than critical risk. This
version is in production in enterprise environments, and will be
available until end of 2023, so the impact is real.

--

[Vulnerability Type]
Insecure Permissions

--

[Vendor of Product]
Gigamon

--

[Affected Product Code Base]
GigaVUE - 5.5.01.11

--

[Affected Component]
Upload functionality

--

[Attack Type]
Remote

--

[Impact Code execution]
true

--

[Attack Vectors]
The authenticated user needs to use the upload functionality. The POST
HTTP verb is being used which needs to be intercepted, and modified
(the "filename" parameter must be manipulated in the POST body
section)

--

[Reference]https://www.gigamon.com/products/access-traffic/physical-nodes.html

--

[Has vendor confirmed or acknowledged the vulnerability?]
true

--

[Discoverer]
Balazs Hambalko, IT Security Consultant


Use CVE-2020-12252.

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/