[FD] Java deserialization vulnerability in QRadar RemoteJavaScript Servlet

2020-10-16 Thread Securify B.V. via Fulldisclosure

Java deserialization vulnerability in QRadar RemoteJavaScript Servlet

Abstract

A Java deserialization vulnerability exists in the QRadar
RemoteJavaScript Servlet. An authenticated user can call one of the
vulnerable methods and cause the Servlet to deserialize arbitrary
objects.

An attacker can exploit this vulnerability by creating a specially
crafted (serialized) object, which amongst other things can result in a
denial of service, change of system settings, or execution of arbitrary
code.


See also

CVE-2020-4280 [2]
6344079 [3] - IBM QRadar SIEM is vulnerable to deserialization of
untrusted data


Tested versions

This issue was successfully verified on QRadar Community Edition [4]
version 7.3.1.6 (7.3.1 Build 20180723171558).


Fix

IBM has released the following versions of QRader in which this issue
has been resolved:

- QRadar / QRM / QVM / QRIF / QNI 7.4.1 Patch 1 [5]
- QRadar / QRM / QVM / QRIF / QNI 7.3.3 Patch 5 [6]


Introduction

QRadar [7] is IBM's enterprise SIEM [8] solution. A free version of
QRadar is available that is known as QRadar Community Edition [4]. This
version is limited to 50 events per second and 5,000 network flows a
minute, supports apps, but is based on a smaller footprint for
non-enterprise use.

A Java deserialization vulnerability [9] exists in the QRadar
RemoteJavaScript Servlet. This Servlet contains a custom JSON-RPC [10]
implementation (based on JSON-RPC version 1.0). Certain methods accept
base64 encoded serialized Java objects. No checks have been implemented
to prevent deserialization of arbitrary objects. Consequently, an
authenticated user can call one of the affected methods and cause the
RemoteJavaScript Servlet to deserialize arbitrary objects.

An attacker can exploit this vulnerability by creating a specially
crafted (serialized) object,  which amongst other things can result in a
denial of service, change of system settings, or execution of arbitrary
code.


Details

The RemoteJavaScript Servlet is only accessible for authenticated users.
It is mapped to the following URLs:

- /remoteJavaScript
- /remoteMethod
- /JSON-RPC
- /JSON-RPC/*

The JSON data can be passed via the URL query string or as POST data.
The JSON data should contain a field named method, which contains the
name of the application and the method that needs to be invoked. The
requested application is looked up in the Application Registry. Each
application has a mapping XML file located under
/opt/qradar/conf/appconfig/ named -exported_methods.xml, which
is essentially a list of all (Java) methods that can be called including
their associated Java class, access control, and other settings.

When the application is found (and licensed), a call is made to
getExportedMethod() to lookup the Java method that needs to be invoked.
After some additional checks - like authorization - the Servlet will
eventually invoke the call() method of the found Java method. If
present, arguments are passed as a String array to the call() method.
These arguments are then converted into the correct type using the
com.q1labs.core.shared.util.ReflectionUtils.stringsToObjects() method.

com.q1labs.uiframeworks.application.ExportedMethod:
public abstract class ExportedMethod extends AllowableObject {
    
[...]
    
    public Object call(PageContext pageContext, String... passedArguments)
throws Exception {
        if (passedArguments != null && passedArguments.length != 0) {
            if (this.log.isDebugEnabled()) {
                this.log.debug("Calling with passed in arguments: " +
Arrays.toString(passedArguments));
            }

            return this.call(pageContext,
this.stringsToObjects(passedArguments));
    
[...]
    
    private Object[] stringsToObjects(String[] paramaters) throws
ExportedMethodException {
        return ReflectionUtils.stringsToObjects(this.getParameterTypes(),
paramaters);
    }

The parameter types differ per method and are provided via the
getParameterTypes() method. If the parameter type is a 'simple' type, it
will be converted without deserialization. H

[FD] Microsoft OneDrive client for Windows Qt QML module hijack

2020-07-09 Thread Securify B.V. via Fulldisclosure

Microsoft OneDrive client for Windows Qt QML module hijack

Yorick Koster, July 2020


Abstract

A file hijacking vulnerability was found in the Microsoft OneDrive
client. This vulnerability allows a local attacker to plant a DLL file
on the local machine. This DLL will then be loaded whenever (another)
user launches OneDrive, running with the privileges of the victim.


Tested version

This issue was successfully verified on Microsoft OneDrive version
19.232.1124.0010.


Fix

This vulnerability was resolved in Microsoft OneDrive version
20.073.0409.0003 [2].


Introduction

OneDrive is Microsoft's cloud storage service, which can be used to
store files including documents, photos, music, videos, et cetera. Files
stored in OneDrive can be accesses from other devices and shared with
others. 

A file hijacking vulnerability was found in the Microsoft OneDrive
client for Windows. This vulnerability allows a local attacker to plant
a DLL file on the local machine. This DLL will then be loaded whenever
(another) user launches OneDrive, running with the privileges of the
victim.

This issue was independently discovered [3] by Elias Dimopoulos [4] from
REDYOPS Labs.


Vulnerability details

When OneDrive starts, it will search in the folder C:\Qt\Qt-5.11.1\ for
any QML module that needs to be loaded. When the module can't be found
under C:\Qt, the application's installation folder will be searched
(generally located under %LOCALAPPDATA%).

https://www.securify.nl/advisory/SFY20200708/onedrivehijack.png

Normally, the C:\Qt folder is not present on Windows systems. Any
authenticated user is permitted to create this folder in the system root
and consequently, a logged on attacker can also create the searched
folder structure. The attacker can then create any of the following
folders and copy a malicious DLL in these folders:

 - Colors
 - Colors.1
 - Colors.1.0
 - ColorThemeManager
 - ColorThemeManager.1
 - ColorThemeManager.1.0
 - QtQuick\Controls\impl
 - QtQuick\Controls\impl.2
 - QtQuick\Controls\impl.2.4
 - QtQuick\Controls\Styles.1.4
 - QtQuick\Controls\Styles.1
 - QtQuick\Controls.1\Styles
 - QtQuick\Controls.1.4\Styles
 - QtQuick\Controls.2\impl
 - QtQuick\Controls.2.0
 - QtQuick\Controls.2.2
 - QtQuick\Controls.2.4
 - QtQuick\Controls.2.4\impl
 - QtQuick\Templates.2.4
 - QtQuick\Window.2.2
 - QtQuick\Window.2.3
 - QtQuick.1\Controls\Styles
 - QtQuick.1.4\Controls\Styles
 - QtQuick.2\Controls\impl
 - QtQuick.2.0
 - QtQuick.2.0\Controls
 - QtQuick.2.11
 - QtQuick.2.2\Controls
 - QtQuick.2.2\Window
 - QtQuick.2.3\Window
 - QtQuick.2.4\Controls
 - QtQuick.2.4\Controls\impl
 - QtQuick.2.4\Templates
 - QtQuick.2.7

Now whenever OneDrive is launched, it will find the attacker's DLL, load
it, and run any code that is present in this DLL. The attacker's code
will run with the privileges of the user that launched OneDrive.


Proof of concept

The following Powershell script can be used to demonstrate this issue.
When successful, the proof of concept will start Calculator.

https://gist.github.com/ykoster/9ce4232fee389de1195a624680419d7e


References

[1] 
https://www.securify.nl/advisory/SFY20200708/microsoft-onedrive-client-for-windows-qt-qml-module-hijack.html
[2] https://oneclient.sfx.ms/Win/MsitSlow/20.073.0409.0003/OneDriveSetup.exe
[3] 
https://labs.redyops.com/index.php/2020/04/27/onedrive-privilege-of-escalation/
[4] https://twitter.com/gweeperx


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Cisco AnyConnect elevation of privileges due to insecure handling of path names

2020-04-21 Thread Securify B.V. via Fulldisclosure

Cisco AnyConnect elevation of privileges due to insecure handling of
path names

Yorick Koster, December 2019


Abstract

The update functionality of the Cisco AnyConnect Secure Mobility Client
for Windows is affected by a path traversal vulnerability that allows
local attackers to create/overwrite files on arbitrary locations.
Successful exploitation of this vulnerability allows the attacker to
gain SYSTEM privileges.


See also

- CVE-2020-3153 [2]
- cisco-sa-ac-win-path-traverse-qO4HWBsj [3] - Cisco AnyConnect Secure
Mobility Client for Windows Uncontrolled Search Path Vulnerability
- SSD Advisory [4] - Cisco AnyConnect Privilege Elevation through Path
Traversal


Tested version

This issue was successfully verified on Cisco AnyConnect Secure Mobility
Client for Windows version 4.8.01090.


Fix

This vulnerability was fixed in Cisco AnyConnect Secure Mobility Client
for Windows version 4.8.02042. Cisco customers with active contracts can
obtain updates through the Software Center at
https://software.cisco.com/download/navigator.html.

Cisco has released bug ID CSCvs46327 [5] for registered users, which
contains additional details and an up-to-date list of affected product
versions.


Introduction

Cisco AnyConnect Secure Mobility Client contains functionality to
auto-update itself. Auto-update also works for low-privileged users,
this is possible because the update is initiated from a service running
with SYSTEM privileges (Cisco AnyConnect Secure Mobility Agent). This
service exposes TCP port 62522 on the loopback device to which clients
can connect and send commands to be handled by this service. One of
these commands it to launch the vpndownloader application and update
AnyConnect.

A path traversal vulnerability exists in the vpndownloader application
for Windows that allows a local user to create and run files outside of
the temporary installer folder. Successful exploitation of this
vulnerability allows a local attacker to gain SYSTEM privileges.


Vulnerability details

The AnyConnect auto-update functionality has been affected by a number
of vulnerabilities in the past that can be abused by local users to gain
SYSTEM privileges (eg, Kostya Kortchinsky [6], Securify [7], Project
Zero [8], SerializingMe [9]). Cisco has made a number of changes to
mitigate these attacks, amongst these changes are:

- Executables need to have a valid Authenticode signature from Cisco Systems, 
Inc..
- (New) versions of vpndownloader.exe are copied to %ProgramData%\Cisco\Cisco 
AnyConnect Secure Mobility Client\Temp\Downloader.
- Proper NTFS permissions are (now) set on the %ProgramData%\Cisco\Cisco 
AnyConnect Secure Mobility Client\ folder.
- The vpndownloader.exe executable must have vpndownloader.exe configured as 
the original filename in its version information.
- When vpndownloader.exe launches additional installation files, these files 
also need to have a valid Authenticode signature from Cisco Systems, Inc..
- Installation files are copied in a separate temporary folder under 
%ProgramData%\Cisco\Cisco AnyConnect Secure Mobility Client\Temp\Installer 
before they are executed.

In a nutshell, the auto-update mechanism works by sending a message to
the AnyConnect Agent to launch vpndownloader.exe and instruct it to
perform a certain action (as command line argument). This action is
either moving/copying a profile (XML) file to a profile folder or launch
a Cisco signed installer file.

Technically, this doesn't need to be an installer file, any Cisco signed
executable will do. When vpndownloader.exe is instructed to run an
installer file, the file is first copied to a temporary folder under
%ProgramData%\Cisco\Cisco AnyConnect Secure Mobility
Client\Temp\Installer. After the file has been copied, the digital
signature is checked including the signer of the file. If all checks
out, the file is launched from the temporary folder and the folder is
deleted after execution has completed.

Because the executable is copied to 

[FD] QRadar session manager path traversal vulnerability

2020-04-21 Thread Securify B.V. via Fulldisclosure

QRadar session manager path traversal vulnerability

Yorick Koster, September 2019


Abstract

A path traversal exists in the session validation functionality of
QRadar. In particular, the vulnerability is present in the part that
handles session tokens (UUIDs). QRadar fails to validate if the
user-supplied token is in the correct format. Using path traversal it is
possible for authenticated users to impersonate other users, and also to
executed arbitrary code (via Java deserialization). The code will be
executed with the privileges of the Tomcat system user.


Tested versions

This issue was successfully verified on QRadar Community Edition [2]
version 7.3.1.6 (7.3.1 Build 20180723171558).


Fix

IBM reports that as part of the Session Authenticator rewrite session
information is no longer stored on disk. Consequently, this issue is
mitigated in QRadar 7.3.2 Patch 3 and newer. In addtion, it is stated
that thist issue is resolved in QRadar Community Edition version 7.3.3
[3].


Introduction

QRadar [4] is IBM's enterprise SIEM [5] solution. A free version of
QRadar is available that is known as QRadar Community Edition [2]. This
version is limited to 50 events per second and 5,000 network flows a
minute, supports apps, but is based on a smaller footprint for
non-enterprise use.

The QRadar web application supports several authentication methods,
including JAAS, basic authentication, OAuth, and token-based
authentication. The token-based authentication uses UUIDs, which either
represents a so-called host token or a file within the /store/sessions/
folder. Whenever QRadar encounters a session token, which is not a host
token, the sessions folder is searched for a file with the same name. If
the file exists, it will be opened and its contents will be
deserialized. The returned object is used to validate the user's
session. In some cases validation is performed on the provided token to
check if it is a properly formatted UUID. Several instances were found
where this validation is not done, allowing for path traversal attacks.

By exploiting this issue it would be possible for an attacker to open a
session file outside the sessions folder. A possible attack scenario
would be if a low privileged user uploads a file to the QRadar server
containing a serialized session object for a different user (eg, Admin)
and thus escalated privileges to that user.

No mitigations have been implemented to prevent deserialization of other
Java objects. Consequently, it is also possible to upload a file
containing other serialized objects. An authenticated attacker can
exploit this vulnerability by uploading a specially crafted (serialized)
object, which amongst other things can result in a denial of service,
change of system settings, or execution of arbitrary code.


Details

Deserialization of the session file happens in the class
com.q1labs.core.shared.sessionmanager.SessionManager. The session file
is retrieved by calling the getFileFromToken() method of the class
com.q1labs.core.shared.sessionmanager.UserSession.

com.q1labs.core.shared.sessionmanager.UserSession:
public static File getFileFromToken(String sessionToken) {
return new File(NVAReader.getProperty("SESSION_DIR", 
"/store/sessions/") + sessionToken);
}

As can be seen in the code fragment above, the provided sessionToken
argument is directly concatenated with the SESSION_DIR configuration
property (normally /store/sessions/). If the file exits, its contents is
deserialized by the SessionManager class.

com.q1labs.core.shared.sessionmanager.SessionManager:
private UserSession deserializeSession(String sessionToken) {
UserSession retSession = null;

try {
File sessionFile = UserSession.getFileFromToken(sessionToken);
if (sessionFile.exists()) {
if (this.log.isDebugEnabled()) {
this.log.debug("Session file exists, 
deserializing...");
}

try {
ObjectInputStream is = new 
ObjectInputStream(new FileInputStream(sess

[FD] Authorization bypass in QRadar Forensics web application

2020-04-21 Thread Securify B.V. via Fulldisclosure

Authorization bypass in QRadar Forensics web application

Yorick Koster, September 2019


Abstract

It was found that any authenticated user can access & use the QRadar
Forensics web application, regardless whether they are granted
permission to use the Forensics application. This bypass only requires
that the user manually sets a cookie named QRIF with the same value as
the user's session cookie.


See also

CVE-2020-4274 [2]
6189705 [3] - IBM QRadar SIEM is vulenrable to Authorization bypass
(CVE-2020-4274)


Tested versions

This issue was successfully verified on QRadar Community Edition [4]
version 7.3.1.6 (7.3.1 Build 20180723171558).


Fix

IBM has released the following versions of QRader in which this issue
has been resolved:

- QRadar / QRM / QVM / QNI 7.4.0 GA [5] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.3 Patch 3 [6] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.2 Patch 7 [7] (SFS)
- QRadar Incident Forensics 7.4.0 [8] (ISO)
- QRadar Incident Forensics 7.4.0 [9] (SFS)


Introduction

QRadar [10] is IBM's enterprise SIEM [11] solution. A free version of
QRadar is available that is known as QRadar Community Edition [4]. This
version is limited to 50 events per second and 5,000 network flows a
minute, supports apps, but is based on a smaller footprint for
non-enterprise use.

The QRadar Forensics web application is normally only accessible for
users that are granted permission to use this application. A centralized
control that checks if the user has permission is implemented in an
include file that is included in most pages. This check can be bypassed
by sending a QRIF cookie to the application. If this cookie is present
and has the same value as the SEC cookie, the permission check is not
performed. Consequently, any authenticated user can access & use the
Forensics web application.


Details

Most PHP pages of the Forensics application (directly or indirectly)
include the PHP file includes/functions.inc.php. A number of checks have
been implemented in this file, including a check to validate the user's
session, a check to detect Cross-Site Request Forgery attacks, and a
permission check to validate if the user has permission to use the
Forensics application. This last check is implemented in the LoginUser()
method of the QRadarHelper class.

/opt/ibm/forensics/html/DejaVu/qradar_helper.php:
public function LoginUser($sessionToken, &$errorInfo)
{
global $s, $u, $QR_HELPER_CODES;
[...]
$qrUserHasForensicsAccess = 
$this->GetQRuserHasForensics($qr_user_info['username']);

The call to LoginUser() is executed from the LoginCurrentUser() method,
which in turn is called form the functions.inc.php include file.

/opt/ibm/forensics/html/includes/functions.inc.php:
require_once('DejaVu/qradar_helper.php');

if (!isset($qrh))
{
$qrh = new QRadarHelper();

[...]
$errorMessage = "";
$userLoggedIn = $qrh->LoginCurrentUser(true, $errorMessage);

Before the call to LoginUser() is made, the LoginCurrentUser() method
first checks if it has received a QRIF cookie. If the cookie is present
and it has the same value of the SEC cookie (the session cookie) the
call to LoginUser() is not made. Not calling LoginUser() also means that
no check is made to validate of the user has permission to use the
Forensics application.

/opt/ibm/forensics/html/DejaVu/qradar_helper.php:
public function LoginCurrentUser ($remember, &$errorInfo)
{
[...]
if(isset($_COOKIE['QRIF']))
{
//if the current cookie is the same as the session token that 
means user hasn't changed
//just update the expiry time
if ($_COOKIE['QRIF'] === $this->session_token)
{
//if cookie is available that means it hasn't expired 
yet so we need to update it's expiry time
//if cookie expiry time is set to 0 (expire with 
browser) then we don't update it
if($cookieExpiryT

[FD] Arbitrary class instantiation & local file inclusion vulnerability in QRadar Forensics web application

2020-04-21 Thread Securify B.V. via Fulldisclosure

Arbitrary class instantiation & local file inclusion vulnerability in
QRadar Forensics web application

Yorick Koster, September 2019


Abstract

It was found that the QRadar Forensics web application is vulnerable to
instantiation of arbitrary objects based on user-supplied input. An
authenticated attacker can abuse this to perform various types of
attacks including Server-Side Request Forgery and (potentially)
arbitrary execution of code.

In addition, the same input is also used to include PHP files, which can
be used to include arbitrary local files. By abusing the case upload
functionality, it is possible for an authenticated user to upload a PHP
file to a known location on the system. By exploiting the local file
inclusion vulnerability it is possible to run arbitrary PHP code. This
code will be executed with the privileges of the Apache system user
(generally the nobody user).


See also

CVE-2020-4272 [2]
6189645 [3] - IBM QRadar SIEM is vulnerable to instantiation of
arbitrary objects (CVE-2020-4272)


Tested versions

This issue was successfully verified on QRadar Community Edition [4]
version 7.3.1.6 (7.3.1 Build 20180723171558).


Fix

IBM has released the following versions of QRader in which this issue
has been resolved:

- QRadar / QRM / QVM / QNI 7.4.0 GA [5] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.3 Patch 3 [6] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.2 Patch 7 [7] (SFS)
- QRadar Incident Forensics 7.4.0 [8] (ISO)
- QRadar Incident Forensics 7.4.0 [9] (SFS)


Introduction

QRadar [10] is IBM's enterprise SIEM [11] solution. A free version of
QRadar is available that is known as QRadar Community Edition [4]. This
version is limited to 50 events per second and 5,000 network flows a
minute, supports apps, but is based on a smaller footprint for
non-enterprise use.

The QRadar web application contains functionality to render various
graphs. The graph that needs to be rendered is based on user-supplied
request parameters. The correct graph and dataset classes are
dynamically loaded based on these parameters. No validation is performed
on the user-supplied parameters, allowing authenticated users to
instantiate arbitrary classes, which can be exploited to perform various
attacks including Server-Side Request Forgery and (potentially)
arbitrary execution of code via specially crafted Phar files [12].

In case a dataset class is provided that has not been declared (loaded)
yet. The code tries to include the correct PHP file in which the class
is defined. The file name of the include file is also based on the same
request parameter. Consequently, the web application is vulnerable to
local file inclusion.

If an attacker manages to place an arbitrary PHP file on the local
system, it is possible to abuse this issue to run arbitrary PHP code. It
was found that the case upload functionality allows uploading of PHP
files to a known location, thus allowing for the execution of arbitrary
PHP code. This code will be executed with the privileges of the Apache
system user (generally the nobody user).



Details

These issues are present in the graphs.php file. This PHP file accepts a
number of request parameters, including chart, dataset, and
output_image.

/opt/ibm/forensics/html/graphs.php:
$chart= ( isset($_REQUEST['chart']) ?
htmlspecialchars($_REQUEST['chart']) : null );
$dataClass= ( isset($_REQUEST['dataset']) ?
htmlspecialchars($_REQUEST['dataset']) : null );
$output_image = ( isset($_REQUEST['output_image']) ?
$_REQUEST['output_image'] : null );

If the output_image parameter is set to true, the PHP code will directly
try to instantiate an object with the name provided in the chart
parameter. One argument is passed to the constructor for which its value
is obtain from a request parameter with the same name as the selected
class name. If the class is successfully loaded, the drawChart() method
is called - regardless of whether this method actually exists.

/opt/ibm/forensics/html/graphs.php:

[FD] PHP object injection vulnerability in QRadar Forensics web application

2020-04-21 Thread Securify B.V. via Fulldisclosure

PHP object injection vulnerability in QRadar Forensics web application

Yorick Koster, September 2019


Abstract

A PHP object injection vulnerability was found in the QRadar Forensics
web application. The vulnerability can be triggered via a specially
crafted cookie and can be used by an authenticated attacker to execute
arbitrary commands. The commands will be executed with the privileges of
the Apache system user.


See also

CVE-2020-4271 [2]
6189651 [3] - IBM QRadar SIEM is vulnerable to PHP object injection
(CVE-2020-4271)


Tested versions

This issue was successfully verified on QRadar Community Edition [4]
version 7.3.1.6 (7.3.1 Build 20180723171558).


Fix

IBM has released the following versions of QRader in which this issue
has been resolved:

- QRadar / QRM / QVM / QNI 7.4.0 GA [5] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.3 Patch 3 [6] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.2 Patch 7 [7] (SFS)
- QRadar Incident Forensics 7.4.0 [8] (ISO)
- QRadar Incident Forensics 7.4.0 [9] (SFS)


Introduction

QRadar [10] is IBM's enterprise SIEM [11] solution. A free version of
QRadar is available that is known as QRadar Community Edition [4]. This
version is limited to 50 events per second and 5,000 network flows a
minute, supports apps, but is based on a smaller footprint for
non-enterprise use.

A PHP object injection vulnerability was found in the QRadar Forensics
web application. The vulnerability exists in the DataSetModel class and
can be triggered via a specially crafted cookie. By exploiting this
issue it is possible for authenticated users to instantiate arbitrary
PHP objects. It has been confirmed that a POP chain exists that can be
used to execute arbitrary commands. The commands will be executed with
the privileges of the Apache system user (generally the nobody user).


Details

The Forensics web application contains functionally to save graph data
in cookies. When a graph is viewed that was previously saved, the data
will be restored from the cookie value(s). Saving and restoring data is
done using PHP object serialization. The serialized data is compressed
and encoded with base64 before it is returned as cookie to the user.
Deserialization of graph cookies is done in the restore() method of the
DataSetModel as is shown in the code fragment below.

/opt/ibm/forensics/html/DejaVu/Reports/DataSetModel.php:
public function restore($dataKeys, $dsize) {
if ($dsize == 0)
// No data
return null;

$cookieData = '';
foreach ($dataKeys as $dataKey) {
if (array_key_exists($dataKey, $_COOKIE)) {
$cookieData .= $_COOKIE[$dataKey];
// All done, so delete the data cookie.
setcookie($dataKey, "", time() - 3600);
} else {
error_log("MISSING COOKIE '$dataKey'");
return null;
}
}

$sz = strlen($cookieData);
if ($sz != $dsize) {
error_log("ERROR: Graph data size incorrect: expected $dsize, 
got $sz");
return null;
}

try {
$dataset = 
unserialize(gzuncompress(base64_decode($cookieData)));
return $dataset;
} catch (Exception $e) {
error_log("Error deserializing session data: " . 
$e->getMessage());
$dataset = null;
}
return null;
}

The restore() method is called in the constructor of various chart
classes, which all inherit from the BaseChart class. These chart classes
are exposed in the /forensics/graphs.php page of the Forensics web
application.

/opt/ibm/forensics/html/DejaVu/Charts.php:
abstract class BaseChart extends ParameterizedObject {
[...]
public function __construct($params=null) {
[...]

$dm = empty($dmodel) ? new DataSetModeler(null) : new $dmodel(null);
if(array_key_exists('si

[FD] Local privilege escalation in QRadar due to run-result-reader.sh insecure file permissions

2020-04-21 Thread Securify B.V. via Fulldisclosure

Local privilege escalation in QRadar due to run-result-reader.sh
insecure file permissions

Yorick Koster, September 2019


Abstract

It was found that the nobody user is owner of the run-result-reader.sh
script. This script is executed by the root user's crontab. Due to this
it is possible for any process running as nobody to add commands to this
script that will be executed with root privileges. In combination with a
code execution vulnerability in QRadar's web application, this can be
used for attacker's to gain full control of the QRadar system.


See also

CVE-2020-4270 [2]
6189657 [3] - IBM QRadar SIEM is vulnerable to privilege escalation
(CVE-2020-4270)


Tested versions

This issue was successfully verified on QRadar Community Edition [4]
version 7.3.1.6 (7.3.1 Build 20180723171558).


Fix

IBM has released the following versions of QRader in which this issue
has been resolved:

- QRadar / QRM / QVM / QNI 7.4.0 GA [5] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.3 Patch 3 [6] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.2 Patch 7 [7] (SFS)
- QRadar Incident Forensics 7.4.0 [8] (ISO)
- QRadar Incident Forensics 7.4.0 [9] (SFS)


Introduction

QRadar [10] is IBM's enterprise SIEM [11] solution. A free version of
QRadar is available that is known as QRadar Community Edition [4]. This
version is limited to 50 events per second and 5,000 network flows a
minute, supports apps, but is based on a smaller footprint for
non-enterprise use.

A local privilege escalation vulnerability was found in QRadar. This
vulnerability is possible because the script located at
/opt/qvm/iem/bin/run-result-reader.sh is configured with weak file
permissions. The owner of the script is set to the nobody user, which is
a low privileged system account use by various services - including
QRadar's web application.

The script is also started by the root user's crontab. This means that
if an attacker manages to gain access to the QRadar system as the nobody
user, it would be possible to escalate privileges to root. This is for
example possible by exploiting a code execution vulnerability in
QRadar's web application.


Details

The crontab of the root user contains various entries to run commands on
different moments. One of these entries will run the
run-result-reader.sh script every 20 minutes:

# crontab -l

[...]

# Update the Endpoint Manager Fixlet Action Results
*/20 * * * * /opt/qvm/iem/bin/run-result-reader.sh  > /var/log/iem-cron.log 2>&1

This script is owned by the nobody user, meaning that this user fully
controls the script and thus fully controls which commands will be
executed.

# ls -la /opt/qvm/iem/bin/run-result-reader.sh
-rwxr-xr-x 1 nobody nobody 2592 Sep 12 17:40
/opt/qvm/iem/bin/run-result-reader.sh

If the (modified) script is run from root's crontab, the commands within
the script will be executed with root privileges. Due to this it is
possible for the nobody to exploit this issue to gain root privileges
and gain full control of the QRadar system.


References

[1] 
https://www.securify.nl/advisory/SFY20200405/local-privilege-escalation-in-qradar-due-to-run-result-reader_sh-insecure-file-permissions.html
[2] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4270
[3] https://www.ibm.com/support/pages/node/6189657
[4] https://developer.ibm.com/qradar/ce/
[5] 
https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=IBM%20Security&product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=7.4.0&platform=Linux&function=fixId&fixids=7.4.0-QRADAR-QRSIEM-20200304205308&includeRequisites=1&includeSupersedes=0&downloadMethod=http
[6] 
https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=IBM%20Security&product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=7.3.0&platform=Linux&function=fixId&fixids=7.3.3-QRADAR-QRSIEM-20200409085709&includeR

[FD] Reflected Cross-Site Scripting in QRadar Forensics link analysis page

2020-04-21 Thread Securify B.V. via Fulldisclosure

Reflected Cross-Site Scripting in QRadar Forensics link analysis page

Yorick Koster, September 2019


Abstract

The QRadar Forensics PHP web application contains a page that is
vulnerable to reflected Cross-Site Scripting. This issue exist due to
the lack of encoding of the single-quote character and can be trigger
without authentication.

This vulnerability allows an attacker to perform a wide variety of
actions such as performing arbitrary actions on the victim's behalf or
presenting a fake login screen to collect usernames and passwords. In
order to exploit this issue, the attacker has to lure a victim into
opening a specially crafted link and pressing a key combination - making
a successful attack less likely. 


Tested versions

This issue was successfully verified on QRadar Community Edition [2]
version 7.3.1.6 (7.3.1 Build 20180723171558).


Fix

IBM reports that QRadar 7.3.2 Patch 6 is not affected by this
vulnerability. In addtion, it is stated that thist issue is resolved in
QRadar Community Edition version 7.3.3 [3].


Introduction

QRadar [4] is IBM's enterprise SIEM [5] solution. A free version of
QRadar is available that is known as QRadar Community Edition [2]. This
version is limited to 50 events per second and 5,000 network flows a
minute, supports apps, but is based on a smaller footprint for
non-enterprise use.

The QRadar Forensics PHP web application contains a page that is
vulnerable to reflected Cross-Site Scripting. This issue exist due to
the lack of encoding of the single-quote character and can be trigger
without authentication.

This vulnerability allows an attacker to perform a wide variety of
actions such as performing arbitrary actions on the victim's behalf or
presenting a fake login screen to collect usernames and passwords. In
order to exploit this issue, the attacker has to lure a victim into
opening a specially crafted link and pressing a key combination - making
a successful attack less likely. 


Details

The vulnerability exists in the LinkAnalysis.php page, located in
/opt/ibm/forensics/html/DejaVu/. The page accepts three request
parameters that are reflected in hidden input fields. Their values are
then used to open a new window to load the LinkAnalysisServlet Servlet.
The page itself appears to be old unused code, however it is still
exposed.

/opt/ibm/forensics/html/DejaVu/LinkAnalysis.php:




var solrQuery = document.getElementById('solrQuery').value;
var solrDocs = document.getElementById('solrDocs').value;
var solrRows = document.getElementById('solrRows').value;

window.onload = function() {

window.open('$servletURL?solrURL=$solrURL&solrQuery='+solrQuery+'&solrDocs='+solrDocs+'&solrRows='+solrRows',
 '_self')
}
 
[...]

The code above uses the htmlentities() [6] function to escape HTML
characters. The flag argument is not provided, meaning that
htmlentities() will not encode the single-quote character.

The values of the request parameters are reflected between single-quotes
and consequently it is possible to break out of the value attribute and
inject additional attributes in the hidden input field. It isn't
possible to inject other HTML tags as the greater-than and less-than
characters are encoded by htmlentities().

Exploiting Cross-Site Scripting vulnerabilities within hidden fields can
be a bit tricky. A method has been described by Gareth Heyes [7] in the
article XSS in hidden input fields [8]. Essentially it requires that the
victim is enticed to press a certain key combination. This behavior is
also browser [9] and OS dependent. As the attacker also needs to lure a
victim into opening a specially crafted link, exploiting this issue may
proof to be difficult.

This issue can be demonstrated using the proof of concept below. When
loading this URL in Firefox, the victim needs to press Alt+Shift+X
(Windows/Linux) or Ctrl+Alt+X (macOS).

https:///forensics/DejaVu/LinkAnalysis.php?solrQuery=%27%20accesskey=X%20onclick=%27alert(document.cookie)


[FD] Cross-Site Request Forgery & weak access control in QRadar ConfigServices webservice

2020-04-21 Thread Securify B.V. via Fulldisclosure

Cross-Site Request Forgery & weak access control in QRadar
ConfigServices webservice

Yorick Koster, September 2019


Abstract

The QRadar web application is deployed with Apache Axis to expose a
number of SOAP services. No measures have been implemented in Axis
and/or QRadar to prevent Cross-Site Request Forgery attacks against
these webservices. Due to this it is possible for an attacker to call
any exposed service via Cross-Site Request Forgery. A successful attack
requires that the attacker tricks/forces a logged in victim to visit the
attacker's specially crafted URL.

Besides the lack of Cross-Site Request Forgery protection, most methods
also lack proper access control checks. A handful of these methods
perform some form of access control, but most methods can be called by
any authenticated user. This could for example be used by a logged in
attacker to gain access to sensitive information (eg, login
credentials).


Tested versions

This issue was successfully verified on QRadar Community Edition [2]
version 7.3.1.6 (7.3.1 Build 20180723171558).


Fix

IBM reports that Apache Axis is no longer used and therefore this issues
has been resolved in upstream builds. In addtion, it is stated that
thist issue is resolved in QRadar Community Edition version 7.3.3 [3].


Introduction

QRadar [4] is IBM's enterprise SIEM [5] solution. A free version of
QRadar is available that is known as QRadar Community Edition [2]. This
version is limited to 50 events per second and 5,000 network flows a
minute, supports apps, but is based on a smaller footprint for
non-enterprise use.

The QRadar web application is deployed with Apache Axis [6] to expose a
number of SOAP services. By default, Axis allows users to call the SOAP
services via a GET request. The GET request is internally converted to a
SOAP envelope, before it is processed by Axis. No measures have been
implemented in Axis and/or QRadar to prevent Cross-Site Request Forgery
attacks against the webservices exposed by Axis. Due to this it is
possible for an attacker to call any exposed service via Cross-Site
Request Forgery. A successful attack requires that the attacker
tricks/forces a logged in victim to visit the attacker's specially
crafted URL.

Besides the lack of Cross-Site Request Forgery protection, most methods
also lack proper access control checks. A handful of these methods
perform some form of access control, but most methods can be called by
any authenticated user. This could for example be used by a logged in
attacker to gain access to sensitive information.

By calling the getNvaProperty() method, it is possible to retrieve any
'NVA' configuration setting. Sensitive settings, like passwords, are
stored encrypted, however there is also a getDecrypted() method that
allows these values to be decrypted. Some passwords are reused for
different services, which also allows users to elevate their own
privileges. For example, the property jpa.connection.password is used
for connecting to PostgreSQL, but is also used as the password for the
ConfigServices account.


Details

Apache Axis provides a SOAP implementation, services can be configured
in various ways. In case of QRadar the services are configured in the
server-config.wsdd file, located under WEB-INF. Three service classes
are currently configured:

- AdminService
- Version
- configservices

The first two are distributed with Axis, the latter one is custom for
QRadar. The AdminService allows for deploying and undeploying of
webservers, however it is configured to only be accessible from
localhost.

The implementation of the configservices webservice can be found in the
class com.q1labs.configservices.core.ConfigurationServices. Any public
method in this class can be called through Axis. The webservice is
mapped to the path /console/services/configservices. There are two ways
to call these methods:

- POST request containing a SOAP envelope. The first tag in the SOAP
body should have the same name as the method that needs to be invoked.
Method parameters are provided as child elements within this tag.
- GET request; the URL parameters are converted

[FD] QRadar RssFeedItem Server-Side Request Forgery vulnerability

2020-04-21 Thread Securify B.V. via Fulldisclosure

QRadar RssFeedItem Server-Side Request Forgery vulnerability

Yorick Koster, September 2019


Abstract

The RssFeedItem class of the QRadar web application is used to fetch and
parse RSS feeds. No validation is performed on the user-supplied RSS
feed URL. Due to the lack of URL validation (whitelisting), it is
possible for authenticated attackers to execute Server-Side Request
Forgery attacks. Using this issue it is possible to call the Apache Axis
AdminService webservice in order to execute arbitrary code with the
privileges of the Tomcat user.


See also

CVE-2020-4294 [2]
6189663 [3] - IBM QRadar SIEM is vulnerable to Server-Side Request
Forgery (SSRF) (CVE-2020-4294)


Tested versions

This issue was successfully verified on QRadar Community Edition [4]
version 7.3.1.6 (7.3.1 Build 20180723171558).


Fix

IBM has released the following versions of QRader in which this issue
has been resolved:

- QRadar / QRM / QVM / QNI 7.4.0 GA [5] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.3 Patch 3 [6] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.2 Patch 7 [7] (SFS)
- QRadar Incident Forensics 7.4.0 [8] (ISO)
- QRadar Incident Forensics 7.4.0 [9] (SFS)


Introduction

QRadar [10] is IBM's enterprise SIEM [11] solution. A free version of
QRadar is available that is known as QRadar Community Edition [4]. This
version is limited to 50 events per second and 5,000 network flows a
minute, supports apps, but is based on a smaller footprint for
non-enterprise use.

The RssFeedItem class of the QRadar web application is used to fetch and
parse (and cache) RSS feeds. The class is exposed in the JSON-RPC
interface via the qradar.getRssFeedItem method. This method can be
called by any authenticated user, no special privileges are required.
RSS feeds are fetched using the Apache Commons HttpClient class, no
validation is performed on the user-supplied URL. Due to the lack of URL
validation (whitelisting), it is possible for authenticated attackers to
execute Server-Side Request Forgery attacks.


Details

Authenticated users can trigger the Server-Side Request Forgery
vulnerability by making a JSON-RPC call with the method set to
qradar.getRssFeedItem. This call is mapped to
com.q1labs.qradar.ui.dashboard.RssFeedItem.getRssFeedItem() and takes
one parameter named feedURL. Any valid URL can be passed to this method.

com.q1labs.qradar.ui.dashboard.RssFeedItem:
public class RssFeedItem extends DashboardItem {
[...]

public static DashboardItem getRssFeedItem(PageContext pageContext, 
String feedURL) throws Exception {
sessionContext = 
RequestUtils.getSessionContext((HttpServletRequest)pageContext.getRequest());
RssFeedItem cachedItem = (RssFeedItem)feedCache.get(feedURL);
cachedItem = null;
if (cachedItem == null || System.currentTimeMillis() - 
cachedItem.lastUpdateTime >= 60L) {
cachedItem = new RssFeedItem(pageContext, feedURL);
feedCache.put(feedURL, cachedItem);
}

return cachedItem;
}

No validation is done on the user-supplied URL, it is directly passed to
HttpClient that will try to make a GET request to this URL. This
behavior allows for Server-Side Request Forgery. The returned HTTP
response is parsed as RSS feed. If the response isn't a valid RSS feed,
an error is returned to the user. Due to this it is not possible to read
the HTTP response, however the GET request is still executed. By abusing
this vulnerability it is possible for an authenticated attacker to make
GET requests to services that are normally not accessible, including
webservices of QRadar that can only be accessed from the local machine.

com.q1labs.qradar.ui.dashboard.RssFeedItem:
public RssFeedItem(PageContext pageContext, String rssURLString) {
GetMethod getMethod = null;
Locale locale = 
LocaleUtil.getLocale((HttpServletRequest)pageContext.getRequest());

   

[FD] Unauthorized access to QRadar configuration sets via default password

2020-04-21 Thread Securify B.V. via Fulldisclosure

Unauthorized access to QRadar configuration sets via default password

Yorick Koster, September 2019


Abstract

QRadar is deployed with a default password for the ConfigServices
account. Using this default password it is possible to download
configuration sets containing sensitive information, including
(encrypted) credentials and host tokens. With these host tokens it is
possible to access other parts of QRadar.


See also

CVE-2020-4269 [2]
6189711 [3] - IBM QRadar SIEM contains hard-coded credentials
(CVE-2020-4269)


Tested versions

This issue was successfully verified on QRadar Community Edition [4]
version 7.3.1.6 (7.3.1 Build 20180723171558).


Fix

IBM has released the following versions of QRader in which this issue
has been resolved:

- QRadar / QRM / QVM / QNI 7.4.0 GA [5] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.3 Patch 3 [6] (SFS)
- QRadar / QRM / QVM / QRIF / QNI 7.3.2 Patch 7 [7] (SFS)
- QRadar Incident Forensics 7.4.0 [8] (ISO)
- QRadar Incident Forensics 7.4.0 [9] (SFS)

As a workaround it is possible to remove or disable the configservices
account in the file /opt/qradar/conf/users.conf.


Introduction

QRadar [10] is IBM's enterprise SIEM [11] solution. A free version of
QRadar is available that is known as QRadar Community Edition [4]. This
version is limited to 50 events per second and 5,000 network flows a
minute, supports apps, but is based on a smaller footprint for
non-enterprise use.

So-called configuration sets can be downloaded via the web interface.
These sets are normally only accessible for the ConfigServices user. It
was found that QRadar is deployed with a default password for the
ConfigServices account. Using this default password it is possible to
download configuration sets containing sensitive information, including
(encrypted) credentials and host tokens. With these host tokens it is
possible to access other parts of QRadar.


Details

The Apache configuration for the QRadar web interface contains a
configuration alias that maps to the
/store/configservices/configurationsets folder. This folder is protected
with the mod_authn_file [12] Apache Module. The only user that is
allowed through is the configservices user.

/etc/httpd/conf.d/configservices_httpd.conf:
Alias /configuration /store/configservices/configurationsets

AuthType Basic
AuthUserFile  /opt/qradar/conf/users.conf
AuthName "Identification"
Options Indexes Includes FollowSymLinks MultiViews ExecCGI
AllowOverride All


require user configservices



The password for this user is set in the file
/opt/qradar/conf/users.conf. The password is protected with the crypt
algorithm, the crypted password is the same for all QRadar
installations.

/opt/qradar/conf/users.conf:
admin:null:ALL:root@localhost:Admin:
configservices:/wEPae8TzCqmM:ALL::ConfigServices:

Cracking the crypted password quickly reveals that the corresponding
password is qradar:

$ python -c 'import crypt; print(crypt.crypt("qradar", "/w"))'
/wEPae8TzCqmM

With the found password it is now possible to download the configuration
set from the web server:

$ curl --insecure --user configservices:qradar
https:///configuration/globalset_list.xml

It should be noted that the default password of the configservices user
only works for the configuration alias as configured in Apache. Recent
versions of QRadar still use the ConfigServices user in other parts of
the web interface. These parts either use a random password (stored in
PostgreSQL) or a so-called host token (via the SEC header or cookie).
However, using the default password it is possible to retrieve the value
of this host token and thus gain access to other parts of QRadar.

curl --insecure --user configservices:qradar -o
/tmp/zipfile_GEN.full.zip
https:///configuration/zipfile_GEN.full.zip
unzip -p /tmp/zipfile_GEN.full.zip /host_tokens.masterlist | grep
'CONSOLE_HOSTCONTEXT='


[FD] ZoneAlarm TrueVector Internet Monitor service insecure NTFS permissions vulnerability

2020-03-17 Thread Securify B.V. via Fulldisclosure

ZoneAlarm TrueVector Internet Monitor service insecure NTFS permissions
vulnerability

Yorick Koster, December 2019


Abstract

A vulnerability was found in the TrueVector Internet Monitor service,
which is installed as part of the Check Point ZoneAlarm firewall. This
vulnerability allows a local attacker to cause the affected service to
change the file permissions of arbitrary local files. After the file
permissions have been changed, the attacker can then overwrite its
content, and ultimately gain elevated privileges on the vulnerable
machine.


Tested version

This vulnerability was successfully verified on ZoneAlarm Free Firewall
v15.8.023.18219/TrueVector Internet Monitor v15.8.7.18219.


Fix

Check Point released new versions of ZoneAlarm Firewall that fix this
vulnerability. The latest version of ZoneAlarm Free Firewall
(v15.8.043.18324) can be obtained from
https://www.zonealarm.com/software/free-firewall/download.

The 2020-03 Cumulative Update [2] for Windows 10 adds hardlink
mitigations. After installing this update, Windows will require write
access on the target file otherwise the hardlink won't be created.
Requiring write access on the target file also mitigates this issue.


Introduction

A vulnerability was found in the TrueVector Internet Monitor service,
which is installed as part of the Check Point ZoneAlarm firewall. This
vulnerability allows a local attacker to cause the affected service to
change the file permissions of arbitrary local files. After the file
permissions have been changed, the attacker can then overwrite its
content, and ultimately gain elevated privileges on the vulnerable
machine.


Vulnerability details

The TrueVector Internet Monitor service is running as LocalSystem, it
periodically creates a number of backup files within the
%ProgramData%\CheckPoint\ZoneAlarm\Data\ folder. When these files are
created, their file permissions are explicitly set to Full Control for
Authenticated Users. A local attacker can create a hardlink with the
same name as the backup files, causing the permissions of another file
to be changed.

After the file permissions have been changed, the attacker can then
overwrite its content, and ultimately gain elevated privileges on the
vulnerable machine. Hardlinks can be created using James Forshaw's [3]
CreateHardlink [4] tool.

CreateHardlink.exe
"%ProgramData%\CheckPoint\ZoneAlarm\Data\bu_tosave.ndb"
"%SystemRoot%\win.ini"
CreateHardlink.exe
"%ProgramData%\CheckPoint\ZoneAlarm\Data\bu_todelete.ndb"
"%SystemRoot%\win.ini"


References

[1] 
https://www.securify.nl/advisory/SFY20200317/zonealarm-truevector-internet-monitor-service-insecure-ntfs-permissions-vulnerability.html
[2] https://www.catalog.update.microsoft.com/Search.aspx?q=KB4540673
[3] https://twitter.com/tiraniddo
[4] 
https://github.com/googleprojectzero/symboliclink-testing-tools/tree/master/CreateHardlink


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Ivanti Workspace Control Application Whitelist bypass via PowerGrid /SEE command line argument

2018-10-01 Thread Securify B.V. via Fulldisclosure


Ivanti Workspace Control Application Whitelist bypass via PowerGrid /SEE
command line argument

Yorick Koster, August 2018


Abstract

It was found that the PowerGrid application can be used to run arbitrary
commands via the /SEE command line option. An attacker can abuse this
issue to bypass Application Whitelisting in order to run arbitrary code
on the target machine.


Tested versions

This issue was successfully verified on Ivanti Workspace Control version
10.2.950.0.


Fix

This issue is mitigated in Ivanti Workspace Control version 10.3.0.0.
The fix included in this version prevents the creation of XML files
within the WMTemp folder, effectively preventing this issue from being
exploited.


Details

https://www.securify.nl/advisory/SFY20180806/ivanti-workspace-control-application-whitelist-bypass-via-powergrid-_see-command-line-argument.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Stored credentials Ivanti Workspace Control can be retrieved from Registry

2018-10-01 Thread Securify B.V. via Fulldisclosure


Stored credentials Ivanti Workspace Control can be retrieved from
Registry

Yorick Koster, August 2018


Abstract

A flaw was found in Workspace Control that allows a local unprivileged
user to retrieve the database or Relay server credentials from the
Windows Registry. These credentials are encrypted, however the
encryption that is used is reversible.


Tested versions

This issue was successfully verified on Ivanti Workspace Control version
10.2.700.1 & 10.2.950.0.


Fix

This issue was resolved in Ivanti Workspace Control version 10.3.10.0.


Details

https://www.securify.nl/advisory/SFY20180804/stored-credentials-ivanti-workspace-control-can-be-retrieved-from-registry.html


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Ivanti Workspace Control Data Security bypass via localhost UNC path

2018-10-01 Thread Securify B.V. via Fulldisclosure


Ivanti Workspace Control Data Security bypass via localhost UNC path

Yorick Koster, August 2018


Abstract

Ivanti Workspace Control contains a flaw where it is possible to access
folders that should be protected by Data Security. A local attacker can
bypass these restrictions using localhost UNC paths. Depending on the
NTFS permissions it may be possible for local users to access files and
folders that should be protected using Data Protection.


Tested versions

This issue was successfully verified on Ivanti Workspace Control version
10.2.700.1 & 10.2.950.0.


Fix

This issue was resolved in Ivanti Workspace Control version 10.3.0.0.


Details

https://www.securify.nl/advisory/SFY20180803/ivanti-workspace-control-data-security-bypass-via-localhost-unc-path.html


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Ivanti Workspace Control local privilege escalation via Named Pipe

2018-10-01 Thread Securify B.V. via Fulldisclosure


Ivanti Workspace Control local privilege escalation via Named Pipe

Yorick Koster, August 2018


Abstract

It was found that Ivanti Workspace Control allows a local (unprivileged)
attacker to run arbitrary commands with Administrator privileges. This
issue can be exploited by spawning a new Composer process, injecting a
malicious thread in this process. This thread connects to a Named Pipe
and sends an instruction to a service to launch an attacker-defined
application with elevated privileges.


Tested versions

This issue was successfully verified on Ivanti Workspace Control version
10.2.700.1 & 10.2.950.0.


Fix

This issue was resolved in Ivanti Workspace Control version 10.3.10.0.


Details

https://www.securify.nl/advisory/SFY20180802/ivanti-workspace-control-local-privilege-escalation-via-named-pipe.html


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Ivanti Workspace Control Application Whitelist bypass via PowerGrid /RWS command line argument

2018-10-01 Thread Securify B.V. via Fulldisclosure


Ivanti Workspace Control Application Whitelist bypass via PowerGrid /RWS
command line argument

Yorick Koster, August 2018


Abstract

It was found that the PowerGrid application will execute rundll32.exe
from a relative path when it is started with the /RWS command line
option. An attacker can abuse this issue to bypass Application
Whitelisting in order to run arbitrary code on the target machine.


Tested versions

This issue was successfully verified on Ivanti Workspace Control version
10.2.700.1.


Fix

This issue was resolved in Ivanti Workspace Control version 10.2.950.0.
PowerGrid now uses the GetSystemDirectory() function to construct an
absolute path to rundll32.exe.


Details

https://www.securify.nl/advisory/SFY20180801/ivanti-workspace-control-application-whitelist-bypass-via-powergrid-_rws-command-line-argument.html


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Authentication bypass vulnerability in Western Digital My Cloud allows escalation to admin privileges

2018-09-18 Thread Securify B.V. via Fulldisclosure


Authentication bypass vulnerability in Western Digital My Cloud allows
escalation to admin privileges

Remco Vermeulen, September 2018


Abstract

It was discovered that the Western Digital My Cloud is affected by an
authentication bypass vulnerability. An unauthenticated attacker can
exploit this vulnerability to authenticate as an admin user without
needing to provide a password, thereby gaining full control of the My
Cloud device.


References

CVE-2018-17153


Tested versions

This vulnerability was successfully verified on a Western Digital My
Cloud model WDBCTL0020HWT running firmware version 2.30.172. This issue
is not limited to the model that was used to find this vulnerability
since most of the products in the My Cloud series share the same
(vulnerable) code.


Fix

There is currently no fix available.


Details

https://www.securify.nl/advisory/SFY20180102/authentication-bypass-vulnerability-in-western-digital-my-cloud-allows-escalation-to-admin-privileges.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Cross-Site Scripting vulnerability in Zimbra Collaboration Suite due to the way it handles attachment links

2018-03-24 Thread Securify B.V. via Fulldisclosure


Cross-Site Scripting vulnerability in Zimbra Collaboration Suite due to
the way it handles attachment links

Stephan Kaag, January 2018


Abstract

A Cross-Site Scripting (XSS) vulnerability was found in Zimbra
Collaboration Suite (ZCS). This issue allows an attacker to perform a
wide variety of actions such as performing arbitrary actions on their
behalf or presenting a fake login screen to collect usernames and
passwords. In order to exploit this issue, the attacker has to lure a
victim into opening a specially crafted email in ZCS.


See also

- CVE-2018-6882
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.7
- https://bugzilla.zimbra.com/show_bug.cgi?id=108786
- https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories


Tested versions

This issue was successfully tested on ZCS 8.7.11_GA_1854 (build
20170531151956). It is however likely that this issue is present in all
versions of ZCS from version 8.5.0 on.


Fix

The issue is fixed in Zimbra Collaboration Suite version 8.8.7.


Details

https://www.securify.nl/advisory/SFY20180101/cross-site-scripting-vulnerability-in-zimbra-collaboration-suite-due-to-the-way-it-handles-attachment-links.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Authentication bypass in Kaseya VSA

2018-01-13 Thread Securify B.V. via Fulldisclosure


Authentication bypass in Kaseya VSA

Kin Hung Cheng, Robert Hartshorn, May 2017


Abstract

A security vulnerability was found in Kaseya VSA that allows users to
view remote computers that they are not authorised to view. Using this
vulnerability a user that is authenticated to view at least one remote
computer can view ever machines in the Kaseya application.


Tested versions

This issue was successfully tested on version R9.2


Fix

Patch to the latest version of VSA.


Details

https://www.securify.nl/advisory/SFY20170504/authentication-bypass-in-kaseya-vsa.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Code execution in Kaseya VSA

2018-01-13 Thread Securify B.V. via Fulldisclosure


Code execution in Kaseya VSA

Kin Hung Cheng, Robert Hartshorn, May 2017


Abstract

A security vulnerability was found in Kaseya VSA file upload file
functionality. Using this vulnerability an authenticated user in a
Kaseya VSA environment is able to upload arbitrary files onto the
server. This functionality can lead to remote code execution with an asp
shell.


Tested versions

This issue was successfully tested on version 9.2


Fix

Patch to the latest version of VSA.


Details

https://www.securify.nl/advisory/SFY20170503/code-execution-in-kaseya-vsa.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Arbitrary file read in Kaseya VSA

2018-01-13 Thread Securify B.V. via Fulldisclosure


Arbitrary file read in Kaseya VSA

Kin Hung Cheng, Robert Hartshorn, May 2017


Abstract

A security vulnerability was found in Kaseya VSA file download file
functionality. Using this vulnerability an authenticated user in a
Kaseya VSA environment is able to download arbitrary files from the
server (including source code of Kaseya, the database backups,
configuration files, and even windows files).


Tested versions

This issue was successfully tested on version R9.2


Fix

Patch to the latest version of VSA.


Details

https://www.securify.nl/advisory/SFY20170502/arbitrary-file-read-in-kaseya-vsa.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] bugt...@securityfocus.com

2017-11-22 Thread Securify B.V. via Fulldisclosure


Clickjacking vulnerability in CSRF error page pfSense

Yorick Koster, November 2017


Abstract

pfSense is a free and open source firewall and router. It was found that
the pfSense WebGUI is vulnerable to Clickjacking. By tricking an
authenticated admin into interacting with a specially crafted webpage it
is possible for an attacker to execute arbitrary code in the WebGUI.
Since the WebGUI runs as the root user, this will result in a full
compromise of the pfSense instance.


Tested versions

This issue was successfully tested on pfSense version 2.4.1.


Fix

pfSense 2.4.2-RELEASE was released that addresses the Clickjacking
issue.


Details

https://www.securify.nl/advisory/SFY20171101/clickjacking-vulnerability-in-csrf-error-page-pfsense.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Clickjacking vulnerability in CSRF error page pfSense

2017-11-22 Thread Securify B.V. via Fulldisclosure


Clickjacking vulnerability in CSRF error page pfSense

Yorick Koster, November 2017


Abstract

pfSense is a free and open source firewall and router. It was found that
the pfSense WebGUI is vulnerable to Clickjacking. By tricking an
authenticated admin into interacting with a specially crafted webpage it
is possible for an attacker to execute arbitrary code in the WebGUI.
Since the WebGUI runs as the root user, this will result in a full
compromise of the pfSense instance.


Tested versions

This issue was successfully tested on pfSense version 2.4.1.


Fix

pfSense 2.4.2-RELEASE was released that addresses the Clickjacking
issue.


Details

https://www.securify.nl/advisory/SFY20171101/clickjacking-vulnerability-in-csrf-error-page-pfsense.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Xamarin Studio for Mac API documentation update affected by local privilege escalation

2017-08-14 Thread Securify B.V. via Fulldisclosure


Xamarin Studio for Mac API documentation update affected by local
privilege escalation

Yorick Koster, April 2017


Abstract

Xamarin Studio is an Integrated Development Environment (IDE) used to
create iOS, Mac and Android applications. Xamarin Studio supports
developments in C# and F# (by default). The API documentation update
mechanism of Xamarin Studio for Mac is installed as setuid root. This
update mechanism contains several flaws that could be leveraged by a
local attacker to gain elevated (root) privileges.


See also

- CVE-2017-8665
- 
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8665



Tested versions

This issue was successfully verified on Xamarin Studio for Mac version
6.2.1 (build 3) and version 6.3 (build 863).


Fix

Microsoft released a new version of Xamarin.iOS that addresses this
issue:
https://support.microsoft.com/en-us/help/4037359


Details

https://www.securify.nl/advisory/SFY20170403/xamarin-studio-for-mac-api-documentation-update-affected-by-local-privilege-escalation.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Buffer over-read vulnerability in Virtuozzo Power Panel (VZPP) and Automator

2017-07-05 Thread Securify B.V. via Fulldisclosure


Buffer over-read vulnerability in Virtuozzo Power Panel (VZPP) and
Automator

Sipke Mellema, July 2017


Abstract

Virtuozzo Power Panel is a solution that allows customers of service
providers to manage their virtual environments. Virtuozzo Automator is
an administrative tool for managing the service provider's virtual
infrastructure. Both products are affected by a buffer over-read
vulnerability that allows attackers to read random server memory.


Tested versions

This issue was tested on Virtuozzo Power Panel version 6.1.2.


Fix

A fix for this issue is included in the following software versions:
- Virtuozzo Power Panel 6.1.2-hotfix5
- Virtuozzo Automator 6.1.2-hotfix5 and 7.0.2-hotfix1


Details

https://www.securify.nl/advisory/SFY20170701/buffer-over-read-vulnerability-in-virtuozzo-power-panel-_vzpp_-and-automator.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] InsomniaX loader allows loading of arbitrary Kernel Extensions

2017-07-02 Thread Securify B.V. via Fulldisclosure


InsomniaX loader allows loading of arbitrary Kernel Extensions

Yorick Koster, April 2017


Abstract

It was found that the loader application bundled with InsomniaX can be
used to load arbitrary Kernel Extensions (kext). The loader is normally
used to load a kext file that is needed to disable the Lid Sleep. A flaw
has been found in the loader that allows a local attacker to load (or
unload) any arbitrary kext file.


See also

- http://semaja2.net/2017/06/insomniax-security-notice/
- http://semaja2.net/2017/06/thank-you-and-farewell-for-now/


Tested versions

This issue was successfully verified on InsomniaX version 2.1.8.


Fix

There is currently no fix available. The author of InsomniaX reports
that InsomniaX is no longer supported. As a workaround, remove the
setuid bit from the loader file. Doing so will prevent users from
disabling the Lid Sleep.

sudo chmod u-s /Applications/InsomniaX.app/Contents/Resources/loader


Details

https://www.securify.nl/advisory/SFY20170405/insomniax-loader-allows-loading-of-arbitrary-kernel-extensions.html


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Re: [FD] SyntaxHighlight MediaWiki extension allows injection of arbitrary Pygments options

2017-05-01 Thread Securify B.V.
MediaWiki version 1.28.2 and version 1.27.3 were release that include a 
fix for this issue.


https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000209.html


On 29-04-17 16:41, Securify B.V. wrote:


SyntaxHighlight MediaWiki extension allows injection of arbitrary
Pygments options

Yorick Koster, February 2017


Abstract

A vulnerability was found in the SyntaxHighlight MediaWiki extension.
Using this vulnerability it is possible for an anonymous attacker to
pass arbitrary options to the Pygments library. By specifying specially
crafted options, it is possible for an attacker to trigger a (stored)
Cross-Site Scripting condition. In addition, it allows the creating of
arbitrary files containing user-controllable data. Depending on the
server configuration, this can be used by an anonymous attacker to
execute arbitrary PHP code.


See also

- CVE-2017-0372
- https://phabricator.wikimedia.org/T158689
- 
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html 
(fix not included in this release)



Tested versions

This issue was tested on SyntaxHighlight version 2.0 as bundled with
MediaWiki version 1.28.0.


Fix

This issue was supposed to be fixed in MediaWiki version 1.28.1 and
version 1.27.2. It appears that the fix was pushed to the git
repository, but for some reason it was not included in the release
packages. It is advised to apply the patch committed to Github.

https://github.com/wikimedia/mediawiki-extensions-SyntaxHighlight_GeSHi/commit/2d5a60a89fb3995b73e17df5901d6f023e41df3d 

https://github.com/wikimedia/mediawiki-extensions-SyntaxHighlight_GeSHi/commit/a88c5e1dcbdb3e9940c6f55a6744c62a6d62710f 




Details

https://www.securify.nl/advisory/SFY20170201/syntaxhighlight_mediawiki_extension_allows_injection_of_arbitrary_pygments_options.html 



___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] SyntaxHighlight MediaWiki extension allows injection of arbitrary Pygments options

2017-04-29 Thread Securify B.V.


SyntaxHighlight MediaWiki extension allows injection of arbitrary
Pygments options

Yorick Koster, February 2017


Abstract

A vulnerability was found in the SyntaxHighlight MediaWiki extension.
Using this vulnerability it is possible for an anonymous attacker to
pass arbitrary options to the Pygments library. By specifying specially
crafted options, it is possible for an attacker to trigger a (stored)
Cross-Site Scripting condition. In addition, it allows the creating of
arbitrary files containing user-controllable data. Depending on the
server configuration, this can be used by an anonymous attacker to
execute arbitrary PHP code.


See also

- CVE-2017-0372
- https://phabricator.wikimedia.org/T158689
- 
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html 
(fix not included in this release)



Tested versions

This issue was tested on SyntaxHighlight version 2.0 as bundled with
MediaWiki version 1.28.0.


Fix

This issue was supposed to be fixed in MediaWiki version 1.28.1 and
version 1.27.2. It appears that the fix was pushed to the git
repository, but for some reason it was not included in the release
packages. It is advised to apply the patch committed to Github.

https://github.com/wikimedia/mediawiki-extensions-SyntaxHighlight_GeSHi/commit/2d5a60a89fb3995b73e17df5901d6f023e41df3d
https://github.com/wikimedia/mediawiki-extensions-SyntaxHighlight_GeSHi/commit/a88c5e1dcbdb3e9940c6f55a6744c62a6d62710f


Details

https://www.securify.nl/advisory/SFY20170201/syntaxhighlight_mediawiki_extension_allows_injection_of_arbitrary_pygments_options.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Local privilege escalation vulnerability in HideMyAss Pro VPN client v3.x for macOS

2017-04-29 Thread Securify B.V.


Local privilege escalation vulnerability in HideMyAss Pro VPN client
v3.x for macOS

Han Sahin, April 2017


Abstract

A local privilege escalation vulnerability has been found in the helper
binary com.privax.hmaprovpn.helper that ships with HideMyAss Pro VPN
v3.3.0.3 for macOS. The helper is installed setuid root and uses the
openvpn binary to create VPN profiles and connections. The helper fails
to perform signature check's on the openvpn file, which is owned by the
user that installed the client. This allows malware on the system to
replace the openvpn binary and run arbitrary code as root.


Tested versions

This issue was tested on HideMyAss Pro VPN v3.3.0.3 for macOS.


Fix

There is currently no fix available.


Details

https://www.securify.nl/advisory/SFY20170408/local_privilege_escalation_vulnerability_in_hidemyass_pro_vpn_client_v3_x_for_macos.html


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Multiple local privilege escalation vulnerabilities in HideMyAss Pro VPN client v2.x for OS X

2017-04-29 Thread Securify B.V.


Multiple local privilege escalation vulnerabilities in HideMyAss Pro VPN
client v2.x for OS X

Han Sahin, April 2017


Abstract

Multiple local privilege escalation vulnerabilities were found in the
helper binary HMAHelper that ships with HideMyAss Pro VPN for OS X. The
helper is installed setuid root and responsible for loading Kernel
Extensions (kext) and managing VPN firewall rules. These issues can be
leveraged by a local attacker to gain elevated (root) privileges.


Tested versions

This issue was tested on HMA Pro VPN version 2.2.7.0 for OS X


Fix

HMA Support has reported that this issue will not be fixed. Version
2.2.7.0. is still available for download and was earlier this year also
available in the Mac App Store. It seems that this version is still
available for older versions of OS X (OS X 10.7 - 10.11).

It should be noted the latest version of HMA Pro VPN for OS X (version
3.3.0.3) is vulnerable to a similar local privilege escalation issue
that is also not fixed at the time of writing.


Details

https://www.securify.nl/advisory/SFY20170402/multiple_local_privilege_escalation_vulnerabilities_in_hidemyass_pro_vpn_client_v2_x_for_os_x.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Authentication bypass vulnerability in Western Digital My Cloud allows escalation to admin privileges

2017-04-22 Thread Securify B.V.


Authentication bypass vulnerability in Western Digital My Cloud allows
escalation to admin privileges

Remco Vermeulen, April 2017


Abstract

It was discovered that the Western Digital My Cloud is affected by an
authentication bypass vulnerability. An unauthenticated attacker can
exploit this vulnerability to authenticate as an admin user without
needing to provide a password, thereby gaining full control of the My
Cloud device.


Tested versions

This vulnerability was successfully verified on a Western Digital My
Cloud model WDBCTL0020HWT running firmware version 2.21.126. This issue
is not limited to the model that was used to find this vulnerability
since most of the products in the My Cloud series share the same
(vulnerable) code.


Fix

This issue was fixed in firmware version 2.30.165.


Details

https://www.securify.nl/advisory/SFY20170404/authentication_bypass_vulnerability_in_western_digital_my_cloud_allows_escalation_to_admin_privileges.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Persistent Cross-Site Scripting in Scriptler Jenkins Plugin

2017-04-14 Thread Securify B.V.


Persistent Cross-Site Scripting in Scriptler Jenkins Plugin

Burak Kelebek, April 2017


Abstract

A Cross-Site Scripting vulnerability was found in the Scriptler Jenkins
plugin. This vulnerability allows an attacker to perform a wide variety
of actions, such as stealing Administrators' session tokens, or
performing arbitrary actions on their behalf. In order to exploit this
issue, an authenticated attacker has to inject arbitrary HTML in the
description of a Scriptler script and wait for an admin to visit the
script overview page. By combining this vulnerability with the reported
Cross-Site Request Forgery vulnerability it is possible for an
unauthenticated attacker to exploit this issue by luring an
authenticated administrator into visiting a specially crafted page.


See also

Jenkins Security Advisory 2017-04-10


Tested versions

This issue was successfully tested on Scriptler version 2.9.


Fix

There is currently no fix available


Details

https://www.securify.nl/advisory/SFY20170406/persistent_cross_site_scripting_in_scriptler_jenkins_plugin.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Microsoft Office OneNote 2007 DLL side loading vulnerability

2017-04-11 Thread Securify B.V.


Microsoft Office OneNote 2007 DLL side loading vulnerability

Yorick Koster, September 2015


Abstract

A DLL side loading vulnerability was found in Microsoft Office OneNote
2007. This issue can be exploited by loading the Microsoft Office
OneNote Mobile ActiveSync Provider for Desktop object as an embedded OLE
object. When instantiating the object Windows will try to load the DLL
ceutil.dll from the current working directory. If an attacker convinces
the user to open a specially crafted (Office) document from a directory
also containing the attacker's DLL file, it is possible to execute
arbitrary code with the privileges of the target user. This can
potentially result in the attacker taking complete control of the
affected system.


See also

- CVE-2017-0197
- Microsoft OneNote 2007 Service Pack 3 (3191829)
- Microsoft OneNote 2010 Service Pack 2 (64-bit editions) (2589382)
- Microsoft OneNote 2010 Service Pack 2 (32-bit editions) (2589382)


Tested versions

This issue was successfully verified on Windows 7 + Office 2007 32-bit.


Fix

Microsoft released updates for Microsoft OneNote 2007 Service Pack 3 and
Microsoft OneNote 2010 Service Pack 2 that fix this vulnerability:

- Microsoft OneNote 2007 Service Pack 3 (3191829)
- Microsoft OneNote 2010 Service Pack 2 (64-bit editions) (2589382)
- Microsoft OneNote 2010 Service Pack 2 (32-bit editions) (2589382)


Details

https://www.securify.nl/advisory/SFY20150907/microsoft_office_onenote_2007_dll_side_loading_vulnerability.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Multiple local privilege escalation vulnerabilities in Proxifier for Mac

2017-04-11 Thread Securify B.V.


Multiple local privilege escalation vulnerabilities in Proxifier for Mac

Yorick Koster, April 2017


Abstract

Multiple local privileges escalation vulnerabilities were found in the
KLoader binary that ships with Proxifier. KLoader is responsible for
loading a Kernel Extension (kext). KLoader is installed setuid root, it
accepts one or two command line arguments that are used in a number of
system commands. These arguments are used in an insecure manner allowing
a local attacker to elevate its privileges. In addition, the environment
is not properly sanitized, which also introduces an possibility to run
arbitrary commands with elevated privileges.


Tested versions

These issues were successfully verified on Proxifier for Mac v2.18.


Fix

Proxifier v2.19 was released that addresses these issues.


Details

https://www.securify.nl/advisory/SFY20170401/multiple_local_privilege_escalation_vulnerabilities_in_proxifier_for_mac.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Microsoft Edge Fetch API allows setting of arbitrary request headers

2017-03-14 Thread Securify B.V.


Microsoft Edge Fetch API allows setting of arbitrary request headers

Yorick Koster, January 2017


Abstract

It was found that the Fetch API in Microsoft Edge allows websites to set
arbitrary HTTP request headers, including the Content-Length, and Host
headers. Amongst others, a malicious website can use this issue to
bypass the same origin policy, read HTTP response headers, or initiate
arbitrary HTTP requests from the victim's browser (HTTP request
smuggling).


See also

- CVE-2017-0140
- MS17-007: Cumulative Security Update for Microsoft Edge (4013071)


Tested versions

This issue was successfully tested on Microsoft Edge version
38.14393.0.0 (EdgeHTML 14.14393).


Fix

Microsoft released MS17-007 that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20170101/microsoft_edge_fetch_api_allows_setting_of_arbitrary_request_headers.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Stack-based buffer overflow in Western Digital My Cloud allows for remote code execution

2017-03-07 Thread Securify B.V.


Stack-based buffer overflow in Western Digital My Cloud allows for
remote code execution

Remco Vermeulen, January 2017


Abstract

It was discovered that the Western Digital My Cloud is vulnerable to a
stack-based buffer overflow in the authentication mechanism. By
exploiting this vulnerability it is possible for an unauthenticated
attacker to run arbitrary code with root privileges.


Tested versions

This vulnerability was successfully verified on a Western Digital My
Cloud model WDBCTL0020HWT running firmware version 2.21.126. This issue
isn't limited to the model that was used to find this vulnerability
since most of the products in the My Cloud series share the same
(vulnerable) code.


Fix

There is currently no fix available.


Details

https://www.securify.nl/advisory/SFY20170105/stack_based_buffer_overflow_in_western_digital_my_cloud_allows_for_remote_code_execution.html


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Western Digital My Cloud vulnerable to Cross-Site Request Forgery vulnerability

2017-03-07 Thread Securify B.V.


Western Digital My Cloud vulnerable to Cross-Site Request Forgery
vulnerability

Remco Vermeulen, January 2017


Abstract

It was discovered that the Western Digital My Cloud is affected by
Cross-Site Request Forgery. This issue can be combined with a command
injection vulnerability (see advisory SFY201703) to gain complete
control (root access) of the affected device.


See also

- 
https://securify.nl/advisory/SFY20170102/authentication_bypass_vulnerability_in_western_digital_my_cloud.html
- 
https://securify.nl/advisory/SFY20170103/western_digital_my_cloud_vulnerable_to_multiple_command_injection_vulnerabilities.html



Tested versions

This issue was successfully verified on a Western Digital My Cloud model
WDBCTL0020HWT running firmware version 2.21.126. The issue isn't limited
to the used model since most of the products in the My Cloud series
share the same (vulnerable) code.


Fix

There is currently no fix available.


Details

https://www.securify.nl/advisory/SFY20170104/western_digital_my_cloud_vulnerable_to_cross_site_request_forgery_vulnerability.html


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Western Digital My Cloud vulnerable to multiple command injection vulnerabilities

2017-03-07 Thread Securify B.V.


Western Digital My Cloud vulnerable to multiple command injection
vulnerabilities

Remco Vermeulen, January 2017


Abstract

It was discovered that the Western Digital My Cloud is affected by
multiple command injection vulnerabilities. Some of these issues don't
require authentication and allow an attacker to gain complete control
(root access) of the affected device. Some do require authentication, in
this case an attacker can use Cross-Site Request Forgery (CSRF, see
advisory SFY20170104) or authentication bypass (see advisory
SFY20170102) and still gain complete control of the vulnerable Western
Digital device.


See also

- 
https://security.szurek.pl/wd-my-cloud-mirror-211153-rce-and-authentication-bypass.html

- https://blog.exploitee.rs/2017/hacking_wd_mycloud/
- https://www.exploitee.rs/index.php/Western_Digital_MyCloud
- 
https://securify.nl/advisory/SFY20170102/authentication_bypass_vulnerability_in_western_digital_my_cloud.html
- 
https://securify.nl/advisory/SFY20170104/western_digital_my_cloud_vulnerable_to_cross_site_request_forgery_vulnerability.html



Tested versions

These vulnerabilities were successfully verified on a Western Digital My
Cloud model WDBCTL0020HWT running firmware versions 2.21.119 and
2.21.126. These issues aren't limited to the model that was used to find
these vulnerabilities since most of the products in the My Cloud series
share the same (vulnerable) code.


Fix

There is currently no fix available.


Details

https://www.securify.nl/advisory/SFY20170103/western_digital_my_cloud_vulnerable_to_multiple_command_injection_vulnerabilities.html


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Multiple persistent Cross-Site Scripting vulnerabilities in osTicket

2017-02-28 Thread Securify B.V.


Multiple persistent Cross-Site Scripting vulnerabilities in osTicket

Han Sahin, July 2016


Abstract

Two persistent Cross-Site Scripting vulnerabilities have been found in
osTicket. These issues exists due to the lack of output encoding on user
input. These vulnerabilities allow an attacker to inject malicious
JavaScript code into the application. This code will then be executed
within the browser of a user who views the dashboard. The
attacker-supplied code can perform a wide variety of actions, such as
stealing victims' session tokens or login credentials, performing
arbitrary actions on their behalf.


Tested versions

These issues were successfully tested on osTicket version 1.9.12.


Fix

osTicket version 1.9.15 and osTicket version 1.10 are released that
address these vulnerabilities.


Details

https://www.securify.nl/advisory/SFY20160801/multiple_persistent_cross_site_scripting_vulnerabilities_in_osticket.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Authentication bypass vulnerability in Western Digital My Cloud

2017-02-08 Thread Securify B.V.


Authentication bypass vulnerability in Western Digital My Cloud

Remco Vermeulen, Januari 2017


Abstract

It was discovered that Western Digital My Cloud is affected by an
authentication bypass vulnerability. By exploiting this vulnerability,
an unauthenticated attacker can bypass the login functionality and gain
full control of the device.


Tested versions

This vulnerability was successfully verified on a Western Digital My
Cloud model WDBCTL0020HWT running firmware version 2.21.119. This issue
isn't limited to the model that was used to find this vulnerability
since most of the products in the My Cloud series share the same
(vulnerable) code.


Fix

Western Digital has released firmware version 2.21.126 that resolves
this vulnerability. This updated firmware can be downloaded from the
following location:
https://support.wdc.com/downloads.aspx?g=904&lang=en#firmware


Details

https://www.securify.nl/advisory/SFY20170102/authentication_bypass_vulnerability_in_western_digital_my_cloud.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Internet Explorer iframe sandbox local file name disclosure vulnerability

2016-08-09 Thread Securify B.V.


Internet Explorer iframe sandbox local file name disclosure
vulnerability

Yorick Koster, March 2016


Abstract

It was found that Internet Explorer allows the disclosure of local file
names. This issue exists due to the fact that Internet Explorer behaves
different for file:// URLs pointing to existing and non-existent files.
When used in combination with HTML5 sandbox iframes it is possible to
use this behavior to find out if a local file exists. This technique
only works on Internet Explorer 10 & 11 since these support the HTML5
sandbox. Also it is not possible to do this from a regular website as
file:// URLs are blocked all together. The attack must be performed
locally (works with Internet zone Mark of the Web) or from a share.


See also

- CVE-2016-3321
- MS16-095: Cumulative Security Update for Internet Explorer (3177356)


Tested versions

This issue was successfully verified on Internet Explorer 10 and
Internet Explorer 11. The HTML5 sandbox iframes is not available in
older versions of Internet Explorer.


Fix

Microsoft released MS16-095 that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20160301/internet_explorer_iframe_sandbox_local_file_name_disclosure_vulnerability.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] DLL side loading vulnerability in VMware Host Guest Client Redirector

2016-08-05 Thread Securify B.V.


DLL side loading vulnerability in VMware Host Guest Client Redirector

Yorick Koster, December 2015


Abstract

A DLL side loading vulnerability was found in the VMware Host Guest
Client Redirector, a component of VMware Tools. This issue can be
exploited by luring a victim into opening a document from the attacker's
share. An attacker can exploit this issue to execute arbitrary code with
the privileges of the target user. This can potentially result in the
attacker taking complete control of the affected system. If the WebDAV
Mini-Redirector is enabled, it is possible to exploit this issue over
the internet.


Tested versions

This issue was successfully verified on VMware Tools for Windows version
10.0.5 build 3228253.


See also

- CVE-2016-5330
- VMSA-2016-0010 - VMware product updates address multiple important
security issues


Fix

This issue has been fixed in VMware Tools for Windows version 10.0.6.


Details

https://www.securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Persistent Cross-Site Scripting in WP Live Chat Support plugin

2016-07-11 Thread Securify B.V.


Persistent Cross-Site Scripting in WP Live Chat Support plugin

Han Sahin, July 2016


Abstract

A persistent Cross-Site Scripting (XSS) vulnerability has been found in
the WP Live Chat Support plugin. By using this vulnerability an attacker
can supply malicious code on behalf of a logged on WordPress user in
order to perform a wide variety of actions, such as stealing victims'
session tokens or login credentials, performing arbitrary actions on
their behalf, and logging their keystrokes.


Tested versions

This issue was successfully tested on WP Live Chat Support WordPress
plugin version 6.2.00.


Fix

This issue has been fixed in version 6.2.02 of the WP Live Chat Support
plugin. The updated plugin can be downloaded from the following
location:
https://downloads.wordpress.org/plugin/wp-live-chat-support.zip.


Details

https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_in_wp_live_chat_support_plugin.html


Summer of Pwnage (https://sumofpwn.nl) is a Dutch community project. Its
goal is to contribute to the security of popular, widely used OSS
projects in a fun and educational way.

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Craft CMS affected by server side template injection

2016-06-27 Thread Securify B.V.


Craft CMS affected by server side template injection

Nelson Berg & Jurgen Kloosterman, June 2016


Abstract

It was discovered that Craft CMS is vulnerable to server-side
template injection. An authenticated attacker can exploit this issue
to compromise Craft CMS, for example by retrieving sensitive data from
configuration files.


Tested versions

All versions of Craft CMS prior to build 2791 are affected by this
vulnerability.


Fix

Pixel & Tonic, Inc. released Craft CMS build 2791 that resolves this
vulnerability. This build can easily be installed through the Control
Panel. After the fix is applied the rendering of templates is globally
limited in TemplatesService.php and TwigEnvironment.php.


Details

https://www.securify.nl/advisory/SFY20160608/craft_cms_affected_by_server_side_template_injection.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Microsoft Visio multiple DLL side loading vulnerabilities

2016-06-15 Thread Securify B.V.


Microsoft Visio multiple DLL side loading vulnerabilities

Yorick Koster, August 2015


Abstract

Multiple DLL side loading vulnerabilities were found in Microsoft Visio.
These issues can be exploited by loading various Visio COM components as
an embedded OLE object. When instantiating a vulnerable object Windows
will try to load the DLL msoutls.dll from the current working directory.
If an attacker convinces the user to open a specially crafted (Office)
document from a directory also containing the attacker's DLL file, it is
possible to execute arbitrary code with the privileges of the target
user. This can potentially result in the attacker taking complete
control of the affected system.


See also

- CVE-2016-3235
- MS16-070: Security Update for Microsoft Office (3163610)


Tested versions

This issue was successfully verified on Windows 7 + Visio 2010.
Microsoft reports that this issue also affects Microsoft Visio 2007,
Microsoft Visio 2013, and Microsoft Visio 2016.


Fix

Microsoft released MS16-070 that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20150804/microsoft_visio_multiple_dll_side_loading_vulnerabilities.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] EMC M&R (Watch4net) lacks Cross-Site Request Forgery protection

2016-04-27 Thread Securify B.V.


EMC M&R (Watch4net) lacks Cross-Site Request Forgery protection

Han Sahin, November 2014


Abstract

It was discovered that EMC M&R (Watch4net) does not protect against
Cross-Site Request Forgery (CSRF) attacks. A successful CSRF attack can
compromise end user data and may allow an attacker to perform an account
hijack. If the targeted end user is the administrator account, this
results in a full compromise of Watch4net.


Affected versions

Versions of EMC ViPR SRM prior to version 3.7 are affected by these
vulnerabilities.


See also

- http://seclists.org/bugtraq/2016/Apr/att-106/ESA-2016-039.txt
- CVE-2016-0891


Fix

EMC released 34247_ViPR-SRM to fix these vulnerabilities. Please
note that this fix is only available for registered EMC Online Support
customers.


Details

https://www.securify.nl/advisory/SFY20141109/emc_m_r__watch4net__lacks_cross_site_request_forgery_protection.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] .NET Framework 4.6 allows side loading of Windows API Set DLL

2016-04-12 Thread Securify B.V.


.NET Framework 4.6 allows side loading of Windows API Set DLL

Yorick Koster, February 2016


Abstract

A DLL side loading vulnerability was found in the .NET Framework version
4.6 when running on Windows Vista or Windows 7. This issue can be
exploited by luring a victim into opening an Office document from the
attacker's share. An attacker can use this issue to execute arbitrary
code with the privileges of the target user. This can potentially result
in the attacker taking complete control of the affected system. If the
WebDAV Mini-Redirector is enabled, it is possible to exploit this issue
over the internet. This issue can be exploited even if the Office
document is opened in Protected View.


See also

- CVE-2016-0148
- MS16-041 : Security Update for .NET Framework (3148789)
- http://www.greyhathacker.net/docs/OfficeDLLhijacking.zip
- https://twitter.com/matthias_kaiser/status/697163250111291398
- 
http://hyp3rlinx.altervista.org/advisories/MICROSOFT-PPT-VIEWER-CODE-EXEC.txt



Tested versions

This issue was successfully verified on Vista running Office 2010 and
.NET 4.6.81.0 & Windows 7 running Office 2013 and .NET 4.6.1055.0.


Fix

Microsoft released MS16-041 that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20160201/_net_framework_4_6_allows_side_loading_of_windows_api_set_dll.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Re: [FD] Windows Mail Find People DLL side loading vulnerability

2016-03-09 Thread Securify B.V.

Hi Stefan,

See below.


On 09-03-16 12:48, Stefan Kanthak wrote:

"Securify B.V." wrote:



Windows Mail Find People DLL side loading vulnerability

Yorick Koster, September 2015

This vulnerability demonstrates Microsoft's terrible SLOPPY coding
horror^Wpractice: it needs two mistakes to create this kind of bug!

"%CommonProgramFiles%\System\wab32res.dll" is (as its name implies)
a resource DLL, which means that it contains no code, but only
(localized) resources, and SHOULD (better: MUST) be loaded via
 LoadLibraryEx("%CommonProgramFiles%\System\wab32res.dll", NULL, 
LOAD_LIBRARY_AS_DATAFILE)
to avoid the call of its DllMain() startup code!
See <https://msdn.microsoft.com/en-us/library/ms684179.aspx>

JFTR: LOAD_LIBRARY_AS_DATAFILE was introduced in the last millennium!

Either
 LoadLibrary("%CommonProgramFiles%\System\wab32res.dll")
or
 LoadLibraryEx("wab32res.dll", NULL, LOAD_LIBRARY_AS_DATAFILE)
were sufficient to avoid this vulnerability.



Fix

Microsoft released MS16-025 that fixes this vulnerability.

Have you checked how Microsoft fixed it?
Did they exercise all due diligence now, practised defense in depth
and replaced the call to
 LoadLibrary("wab32res.dll")
with a call to
 LoadLibraryEx("%CommonProgramFiles%\System\wab32res.dll", NULL, 
LOAD_LIBRARY_AS_DATAFILE)?


They still use LoadLibrary() to load wab32res.dll. Previously, the 
fetched a path from HKLM\Software\Microsoft\WAB\DLLPath and appended 
wab32res.dll to the result, which was fed into LoadLibrary().


With MS16-025 they sanitize DLLpath using PathRemoveFileSpec(). By 
default DLLPath is set to %CommonProgramFiles%\System\wab32.dll, 
PathRemoveFileSpec() removes wab32.dll from the path. They also call 
ExpandEnvironmentStrings(), but that was also the case previously.


With kind regards,

Yorick

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Windows Mail Find People DLL side loading vulnerability

2016-03-08 Thread Securify B.V.


Windows Mail Find People DLL side loading vulnerability

Yorick Koster, September 2015


Abstract

A DLL side loading vulnerability was found in the Windows Mail Find
People DLL. This issue can be exploited by loading the "For &People..."
object as an embedded OLE object. When instantiating the object Windows
will try to load the DLL wab32res.dll from the current working
directory. If an attacker convinces the user to open a specially crafted
(Office) document from a directory also containing the attacker's DLL
file, it is possible to execute arbitrary code with the privileges of
the target user. This can potentially result in the attacker taking
complete control of the affected system.


See also

- CVE-2016-0100
- MS16-025: Security Update for Windows Library Loading to Address
Remote Code Execution (3140709)


Tested versions

This issue was successfully verified on Windows Vista + Office 2010
32-bit.


Fix

Microsoft released MS16-025 that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20150904/windows_mail_find_people_dll_side_loading_vulnerability.html


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Re: [FD] OLE DB Provider for Oracle multiple DLL side loading vulnerabilities

2016-02-10 Thread Securify B.V.


Fix

Microsoft released MS16-014 that fixes this vulnerability.


On 16-12-15 19:26, Securify B.V. wrote:


OLE DB Provider for Oracle multiple DLL side loading vulnerabilities

Yorick Koster, August 2015


Abstract

Multiple DLL side loading vulnerabilities were found in the OLE DB
Provider for Oracle. These issues can be exploited by loading various
OLE components as an embedded OLE object. When instantiating the object
Windows will try to load the DLLs oci.dll, and ociw32.dll from the
current working directory. If an attacker convinces the user to open a
specially crafted (Office) document from a directory also containing the
attacker's DLL file, it is possible to execute arbitrary code with the
privileges of the target user. This can potentially result in the
attacker taking complete control of the affected system.


See also

http://www.greyhathacker.net/docs/OfficeDLLhijacking.zip
https://securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html 




Tested versions

This issue was successfully verified on Windows 7 + Office 2007 32-bit,
Windows Vista + Office 2010 32-bit, Windows 7 + Office 2013 32-bit.


Fix

There is currently no fix available.


Details

https://www.securify.nl/advisory/SFY20150806/ole_db_provider_for_oracle_multiple_dll_side_loading_vulnerabilities.html 



___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] MapsUpdateTask Task DLL side loading vulnerability

2016-02-10 Thread Securify B.V.


MapsUpdateTask Task DLL side loading vulnerability

Yorick Koster, November 2015


Abstract

A DLL side loading vulnerability was found in the MapsUpdateTask Task
DLL that ships with Windows 10. This issue can be exploited by loading
COM control as an embedded OLE object. When instantiating the object
Windows will try to load the DLL phoneinfo.dll from the current working
directory. If an attacker convinces the user to open a specially crafted
(Office) document from a directory also containing the attacker's DLL
file, it is possible to execute arbitrary code with the privileges of
the target user. This can potentially result in the attacker taking
complete control of the affected system.


See also

- CVE-2016-0041
- MS16-014: Security Update for Microsoft Windows to Address Remote
Code Execution (3134228)


Tested versions

This issue was successfully verified on Windows 10 + Office 2016 64-bit.


Fix

Microsoft released MS16-014 that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20151101/mapsupdatetask_task_dll_side_loading_vulnerability.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] BDA MPEG2 Transport Information Filter DLL side loading vulnerability

2016-02-10 Thread Securify B.V.


BDA MPEG2 Transport Information Filter DLL side loading vulnerability

Yorick Koster, September 2015


Abstract

A DLL side loading vulnerability was found in the BDA MPEG2 Transport
Information Filter that ships with Windows Vista. This issue can be
exploited by loading the filter as an embedded OLE object. When
instantiating the object Windows will try to load the DLL ehTrace.dll
from the current working directory. If an attacker convinces the user to
open a specially crafted (Office) document from a directory also
containing the attacker's DLL file, it is possible to execute arbitrary
code with the privileges of the target user. This can potentially result
in the attacker taking complete control of the affected system.


See also

- CVE-2016-0041
- MS16-014: Security Update for Microsoft Windows to Address Remote
Code Execution (3134228)


Tested versions

This issue was successfully verified on Windows Vista + Office 2010
32-bit.


Fix

Microsoft released MS16-014 that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20150906/bda_mpeg2_transport_information_filter_dll_side_loading_vulnerability.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] NPS Datastore server DLL side loading vulnerability

2016-02-10 Thread Securify B.V.


NPS Datastore server DLL side loading vulnerability

Yorick Koster, September 2015


Abstract

A DLL side loading vulnerability was found in the NPS Datastore server
DLL that ships with Windows Vista. This issue can be exploited by
loading the affected DLL as an embedded OLE object. When instantiating
the object Windows will try to load the DLL iasdatastore2.dll from the
current working directory. If an attacker convinces the user to open a
specially crafted (Office) document from a directory also containing the
attacker's DLL file, it is possible to execute arbitrary code with the
privileges of the target user. This can potentially result in the
attacker taking complete control of the affected system.


See also

- CVE-2016-0041
- MS16-014: Security Update for Microsoft Windows to Address Remote
Code Execution (3134228)


Tested versions

This issue was successfully verified on Windows Vista + Office 2010
32-bit.


Fix

Microsoft released MS16-014 that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20150905/nps_datastore_server_dll_side_loading_vulnerability.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] HP LaserJet Fax Preview DLL side loading vulnerability

2016-01-23 Thread Securify B.V.


HP LaserJet Fax Preview DLL side loading vulnerability

Yorick Koster, September 2015


Abstract

A DLL side loading vulnerability was found in the HP LaserJet Fax
Preview Resource DLL. This issue can be exploited by loading the
FaxPreview Class as an embedded OLE object. When instantiating the
object Windows will try to load the DLL MFC80ENU.DLL from the current
working directory. If an attacker convinces the user to open a specially
crafted (Office) document from a directory also containing the
attacker's DLL file, it is possible to execute arbitrary code with the
privileges of the target user. This can potentially result in the
attacker taking complete control of the affected system.


Affected versions

This issue was successfully verified on the HP Color LaserJet CM2320 MFP
drivers version 3.1 (CM2320series-win7-full-solution-AM-EMEA1-v3.1.exe).


Fix

There is currently no fix available, HP reports: "Unfortunately, the
driver software for these devices can no longer be updated. The devices
have ended support life and the engineering resources are no longer
available to provide any firmware updates.  We do understand the issue,
and current drivers are no longer vulnerable to the OLE side load
issue".


Details

https://www.securify.nl/advisory/SFY20150903/hp_laserjet_fax_preview_dll_side_loading_vulnerability.html
https://www.securify.nl/exploit/SFY20150901/hp_laserjet_ole_sideload.html
https://www.securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] HP ToComMsg DLL side loading vulnerability

2016-01-23 Thread Securify B.V.


HP ToComMsg DLL side loading vulnerability

Yorick Koster, September 2015


Abstract

A DLL side loading vulnerability was found in the HP ToComMsg DLL. This
issue can be exploited by loading the TcComMsg.AutoTcComMsg object as an
embedded OLE object. When instantiating the object Windows will try to
load the DLL MFC80ENU.DLL from the current working directory. If an
attacker convinces the user to open a specially crafted (Office)
document from a directory also containing the attacker's DLL file, it is
possible to execute arbitrary code with the privileges of the target
user. This can potentially result in the attacker taking complete
control of the affected system.


Tested versions

This issue was successfully verified on the HP Color LaserJet CM2320 MFP
drivers version 3.1 (CM2320series-win7-full-solution-AM-EMEA1-v3.1.exe).


Fix

There is currently no fix available, HP reports: "Unfortunately, the
driver software for these devices can no longer be updated. The devices
have ended support life and the engineering resources are no longer
available to provide any firmware updates.  We do understand the issue,
and current drivers are no longer vulnerable to the OLE side load
issue".


Details

https://www.securify.nl/advisory/SFY20150902/hp_tocommsg_dll_side_loading_vulnerability.html
https://www.securify.nl/exploit/SFY20150901/hp_laserjet_ole_sideload.html
https://www.securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] LEADTOOLS ActiveX control multiple DLL side loading vulnerabilities

2016-01-23 Thread Securify B.V.


LEADTOOLS ActiveX control multiple DLL side loading vulnerabilities

Yorick Koster, September 2015


Abstract

Multiple DLL side loading vulnerabilities were found in the LEADTOOLS
ActiveX control. These issues can be exploited by loading various COM
components as an embedded OLE object. When instantiating the object
Windows will try to load the DLL LTANN11N.DLL from the current working
directory. If an attacker convinces the user to open a specially crafted
(Office) document from a directory also containing the attacker's DLL
file, it is possible to execute arbitrary code with the privileges of
the target user. This can potentially result in the attacker taking
complete control of the affected system.


Affected versions

This issue was successfully verified on the HP Color LaserJet CM2320 MFP
drivers version 3.1 (CM2320series-win7-full-solution-AM-EMEA1-v3.1.exe).


Fix

There is currently no fix available, HP reports: "Unfortunately, the
driver software for these devices can no longer be updated. The devices
have ended support life and the engineering resources are no longer
available to provide any firmware updates.  We do understand the issue,
and current drivers are no longer vulnerable to the OLE side load
issue".


Details

https://www.securify.nl/advisory/SFY20150901/leadtools_activex_control_multiple_dll_side_loading_vulnerabilities.html
https://www.securify.nl/exploit/SFY20150901/hp_laserjet_ole_sideload.html
https://www.securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] OLE DB Provider for Oracle multiple DLL side loading vulnerabilities

2015-12-16 Thread Securify B.V.


OLE DB Provider for Oracle multiple DLL side loading vulnerabilities

Yorick Koster, August 2015


Abstract

Multiple DLL side loading vulnerabilities were found in the OLE DB
Provider for Oracle. These issues can be exploited by loading various
OLE components as an embedded OLE object. When instantiating the object
Windows will try to load the DLLs oci.dll, and ociw32.dll from the
current working directory. If an attacker convinces the user to open a
specially crafted (Office) document from a directory also containing the
attacker's DLL file, it is possible to execute arbitrary code with the
privileges of the target user. This can potentially result in the
attacker taking complete control of the affected system.


See also

http://www.greyhathacker.net/docs/OfficeDLLhijacking.zip
https://securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html


Tested versions

This issue was successfully verified on Windows 7 + Office 2007 32-bit,
Windows Vista + Office 2010 32-bit, Windows 7 + Office 2013 32-bit.


Fix

There is currently no fix available.


Details

https://www.securify.nl/advisory/SFY20150806/ole_db_provider_for_oracle_multiple_dll_side_loading_vulnerabilities.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Shockwave Flash Object DLL side loading vulnerability

2015-12-16 Thread Securify B.V.


Shockwave Flash Object DLL side loading vulnerability

Yorick Koster, August 2015


Abstract

A DLL side loading vulnerability was found in the Flash version that
ships with Windows. This issue can be exploited by loading the Shockwave
Flash object as an embedded OLE object. When instantiating the object
Windows will try to load the DLL spframe.dll from the current working
directory. If an attacker convinces the user to open a specially crafted
(Office) document from a directory also containing the attacker's DLL
file, it is possible to execute arbitrary code with the privileges of
the target user. This can potentially result in the attacker taking
complete control of the affected system.


See also

https://advisory.securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html


Tested versions

This issue was successfully verified on Windows 10 + Office 2013 32-bit.


Fix

It appears that this issue has been resolved by the security updates for
Adobe Flash Player of November 2015 (version 19.0.0.245 or later,
APSB15-28 [3]). The initialization code has been changed in this
version. Currently, the DLL spframe.dll is only loaded if Flash is
started from Microsoft Edge. In all other cases, Flash tries to load
ieframe.dll instead of spframe.dll. ieframe.dll is located in System32,
which is searched before the current working directory, preventing side
loading of this DLL.


Details

https://www.securify.nl/advisory/SFY20150802/shockwave_flash_object_dll_side_loading_vulnerability.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Shutdown UX DLL side loading vulnerability

2015-12-16 Thread Securify B.V.


Shutdown UX DLL side loading vulnerability

Yorick Koster, November 2015


Abstract

A DLL side loading vulnerability was found in the Shutdown UX DLL. This
issue can be exploited by loading the Authentication UI Shutdown Choices
object as an embedded OLE object. When instantiating the object Windows
will try to load the DLL wuaext.dll from the current working directory.
If an attacker convinces the user to open a specially crafted (Office)
document from a directory also containing the attacker's DLL file, it is
possible to execute arbitrary code with the privileges of the target
user. This can potentially result in the attacker taking complete
control of the affected system.


See also

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6132
https://technet.microsoft.com/library/security/MS15-132
https://securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html


Tested versions

This issue was successfully verified on Windows 10 + Office 2016 64-bit.


Fix

Microsoft released MS15-132 [4] that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20151102/shutdown_ux_dll_side_loading_vulnerability.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Windows Authentication UI DLL side loading vulnerability

2015-12-12 Thread Securify B.V.


Windows Authentication UI DLL side loading vulnerability

Yorick Koster, August 2015


Abstract

A DLL side loading vulnerability was found in the Windows Authentication
UI DLL. This issue can be exploited by loading the Slide To Shut Down
Screen object as an embedded OLE object. When instantiating the object
Windows will try to load the DLL wuaext.dll from the current working
directory. If an attacker convinces the user to open a specially crafted
(Office) document from a directory also containing the attacker's DLL
file, it is possible to execute arbitrary code with the privileges of
the target user. This can potentially result in the attacker taking
complete control of the affected system.


See also

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6132
https://technet.microsoft.com/library/security/MS15-132
https://advisory.securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html


Tested versions

This issue was successfully verified on Windows 10 + Office 2013 32-bit,
and Windows 10 + Office 2016 64-bit.


Fix

Microsoft released MS15-132 that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20150803/windows_authentication_ui_dll_side_loading_vulnerability.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Event Viewer Snapin multiple DLL side loading vulnerabilities

2015-12-12 Thread Securify B.V.


Event Viewer Snapin multiple DLL side loading vulnerabilities

Yorick Koster, August 2015


Abstract

Multiple DLL side loading vulnerabilities were found in the Event Viewer
Snapin that ships with Windows. These issues can be exploited by loading
various COM components as an embedded OLE object. When instantiating
vulnerable object Windows will try to load the DLL elsext.dll from the
current working directory. If an attacker convinces the user to open a
specially crafted (Office) document from a directory also containing the
attacker's DLL file, it is possible to execute arbitrary code with the
privileges of the target user. This can potentially result in the
attacker taking complete control of the affected system.


See also

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6132
https://technet.microsoft.com/library/security/MS15-132
http://www.greyhathacker.net/docs/OfficeDLLhijacking.zip
https://code.google.com/p/google-security-research/issues/detail?id=514
https://advisory.securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html


Tested versions

This issue was successfully verified on Windows 7 + Office 2007 32-bit,
Windows Vista + Office 2010 32-bit, Windows 7 + Office 2013 32-bit.


Fix

Microsoft released MS15-132 that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20150805/event_viewer_snapin_multiple_dll_side_loading_vulnerabilities.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] COM+ Services DLL side loading vulnerability

2015-12-12 Thread Securify B.V.


COM+ Services DLL side loading vulnerability

Yorick Koster, August 2015


Abstract

A DLL side loading vulnerability was found in the COM+ Services
component that ships with Windows. This issue can be exploited by
loading the QC Queue Administration Class as an embedded OLE object.
When instantiating the object Windows will try to load the DLL mqrt.dll
from the current working directory. If an attacker convinces the user to
open a specially crafted (Office) document from a directory also
containing the attacker's DLL file, it is possible to execute arbitrary
code with the privileges of the target user. This can potentially result
in the attacker taking complete control of the affected system.


See also

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6132
https://technet.microsoft.com/library/security/MS15-132
https://code.google.com/p/google-security-research/issues/detail?id=556
https://advisory.securify.nl/blog/SFY20151201/there_s_a_party_in_ole__and_you_are_invited.html


Tested versions

This issue was successfully verified on Windows 7 + Office 2007 32-bit,
Windows Vista + Office 2010 32-bit, Windows 7/10 + Office 2013 32-bit,
and Windows 10 + Office 2016 64-bit.


Fix

Microsoft released MS15-132 that fixes this vulnerability.


Details

https://www.securify.nl/advisory/SFY20150801/com__services_dll_side_loading_vulnerability.html 



___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Re: [FD] Cisco AnyConnect elevation of privileges via DMG install script

2015-09-30 Thread Securify B.V.


Fix

Cisco customers with active contracts can obtain updates through the
Software Center at https://software.cisco.com/download/navigator.html.

Cisco has released bug ID CSCuv11947 for registered users, which
contains additional details and an up-to-date list of affected product
versions.


On 23-09-15 19:14, Securify B.V. wrote:


Cisco AnyConnect elevation of privileges via DMG install script

Yorick Koster, July 2015


Abstract

Cisco AnyConnect Secure Mobility Client for OS X is affected by a
vulnerability that allows local attackers to mount arbitrary DMG files
at arbitrary mount points. By exploiting this vulnerability is is
possible for the attacker to gain root privileges. Cisco reports that a
similar issue also exists in Cisco AnyConnect Secure Mobility Client for
Linux.


See also

- CVE-2015-6306
- http://tools.cisco.com/security/center/viewAlert.x?alertId=41135


Tested version

This issue was successfully verified on Cisco AnyConnect Secure Mobility
Client for OS X version 3.1.08009.


Fix

There is currently no fix available. Updates are expected to be released
on September 30, 2015.

Cisco has released bug ID CSCuv11947 for registered users, which
contains additional details and an up-to-date list of affected product
versions.


Details

https://www.securify.nl/advisory/SFY20150701/cisco_anyconnect_elevation_of_privileges_via_dmg_install_script.html 



___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Re: [FD] Cisco AnyConnect elevation of privileges via DLL side loading

2015-09-30 Thread Securify B.V.


Fix

Cisco customers with active contracts can obtain updates through the
Software Center at https://software.cisco.com/download/navigator.html.

Cisco has released bug ID CSCuv01279 [5] for registered users, which
contains additional details and an up-to-date list of affected product
versions.


On 22-09-15 18:18, Securify B.V. wrote:


Cisco AnyConnect elevation of privileges via DLL side loading

Yorick Koster, June 2015


Abstract

Cisco AnyConnect Secure Mobility Client for Windows is affected by an
vulnerability that allows local attackers to execute arbitrary DLL files
with elevated privilege. By exploiting this vulnerability is is possible
for the attacker to gain SYSTEM privileges.


See also

- CVE-2015-6305
- http://tools.cisco.com/security/center/viewAlert.x?alertId=41136
- https://code.google.com/p/google-security-research/issues/detail?id=460


Test version

This issue was successfully verified on Cisco AnyConnect Secure Mobility
Client for Windows version 3.1.08009.


Fix

There is currently no fix available. Updates are expected to be released
on September 30, 2015.

Cisco has released bug ID CSCuv01279 for registered users, which
contains additional details and an up-to-date list of affected product
versions.


Details

https://www.securify.nl/advisory/SFY20150601/cisco_anyconnect_elevation_of_privileges_via_dll_side_loading.html 



___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Cisco AnyConnect elevation of privileges via DMG install script

2015-09-23 Thread Securify B.V.


Cisco AnyConnect elevation of privileges via DMG install script

Yorick Koster, July 2015


Abstract

Cisco AnyConnect Secure Mobility Client for OS X is affected by a
vulnerability that allows local attackers to mount arbitrary DMG files
at arbitrary mount points. By exploiting this vulnerability is is
possible for the attacker to gain root privileges. Cisco reports that a
similar issue also exists in Cisco AnyConnect Secure Mobility Client for
Linux.


See also

- CVE-2015-6306
- http://tools.cisco.com/security/center/viewAlert.x?alertId=41135


Tested version

This issue was successfully verified on Cisco AnyConnect Secure Mobility
Client for OS X version 3.1.08009.


Fix

There is currently no fix available. Updates are expected to be released
on September 30, 2015.

Cisco has released bug ID CSCuv11947 for registered users, which
contains additional details and an up-to-date list of affected product
versions.


Details

https://www.securify.nl/advisory/SFY20150701/cisco_anyconnect_elevation_of_privileges_via_dmg_install_script.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Cisco AnyConnect elevation of privileges via DLL side loading

2015-09-22 Thread Securify B.V.


Cisco AnyConnect elevation of privileges via DLL side loading

Yorick Koster, June 2015


Abstract

Cisco AnyConnect Secure Mobility Client for Windows is affected by an
vulnerability that allows local attackers to execute arbitrary DLL files
with elevated privilege. By exploiting this vulnerability is is possible
for the attacker to gain SYSTEM privileges.


See also

- CVE-2015-6305
- http://tools.cisco.com/security/center/viewAlert.x?alertId=41136
- https://code.google.com/p/google-security-research/issues/detail?id=460


Test version

This issue was successfully verified on Cisco AnyConnect Secure Mobility
Client for Windows version 3.1.08009.


Fix

There is currently no fix available. Updates are expected to be released
on September 30, 2015.

Cisco has released bug ID CSCuv01279 for registered users, which
contains additional details and an up-to-date list of affected product
versions.


Details

https://www.securify.nl/advisory/SFY20150601/cisco_anyconnect_elevation_of_privileges_via_dll_side_loading.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Multiple Cross-Site Scripting vulnerabilities in Synology Download Station

2015-09-09 Thread Securify B.V.


Multiple Cross-Site Scripting vulnerabilities in Synology Download
Station

Han Sahin, September 2015


Abstract

Multiple Cross-Site Scripting vulnerabilities were found in Synology
Download Station. These issues allow attackers to perform a wide variety
of actions, such as stealing victims' session tokens or login
credentials if available, performing arbitrary actions on their behalf
but also performing arbitrary redirects to potential malicious websites.


Tested version

These issues have been tested on Synology Download Station version
3.5-2956 and version 3.5-2962.


Fix

Synology reports that these issue have been resolved in:

- Download Station version 3.5-2962 [Create download task via file
upload]
- Download Station version 3.5-2967 [Create download task via URL]


Details

https://www.securify.nl/advisory/SFY20150809/multiple_cross_site_scripting_vulnerabilities_in_synology_download_station.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Synology Video Station command injection and multiple SQL injection vulnerabilities

2015-09-09 Thread Securify B.V.


Synology Video Station command injection and multiple SQL injection
vulnerabilities

Han Sahin, September 2015


Abstract

It was discovered that Synology Video Station is vulnerable to command
injection that allows an attacker to execute arbitrary system commands
with root privileges. In addition, Video Station is affected by multiple
SQL injection vulnerabilities that allows for execution of arbitrary SQL
statements with DBA privileges. As a result it is possible to compromise
the PostgreSQL database server.


Affected versions

These issues affect Synology Video Station version up to and including
version 1.5-0757.


Fix

Synology has reported that these issue have been resolved in:

- Video Station version 1.5-0757 [audiotrack.cgi]
- Video Station version 1.5-0763 [watchstatus.cgi]
- Video Station version 1.5-0763 [subtitle.cgi]


Details

https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html 



___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Re: [FD] Integer overflow in .NET Framework System.DirectoryServices.Protocols.Utility class

2015-09-08 Thread Securify B.V.

Microsoft released MS15-101 that addresses this issue:
https://technet.microsoft.com/library/security/ms15-101

On 25-07-15 09:02, Securify B.V. wrote:


Integer overflow in .NET Framework
System.DirectoryServices.Protocols.Utility class

Yorick Koster, May 2015


Abstract

An integer overflow exists in the
System.DirectoryServices.Protocols.Utility class of the .NET Framework.
Triggering this issue results in an overflown integer that is used to
allocate a buffer on the heap that is too small, resulting in memory
corruption. Exploiting this issues appears to be difficult.
Consequently, Microsoft has decided to not release a security bulletin.


Affected versions

This issue affects .NET Framework version 4.5 and 4.6. Other versions
are not affected as this issue can only be triggered using large arrays
(> 2GB).


Fix

There is currently no fix available for this issue. Microsoft will not
release a security bulletin, it may be fixed in future versions of the
.NET Framework.

[...] [we] are going to pursue this as a candidate for improvement in
future versions, [...] On x86, the feasibility of an attack is mitigated
by the maximum process memory and even on amd64, prevailing
configurations preclude this from being a feasible attack.


Details

https://www.securify.nl/advisory/SFY20150501/integer_overflow_in__net_framework_system_directoryservices_protocols_utility_class.html 



___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Weak authentication in EMC Secure Remote Services Virtual Edition Web Portal

2015-08-17 Thread Securify B.V.


Weak authentication in EMC Secure Remote Services Virtual Edition Web
Portal

Han Sahin, November 2014


Abstract

It was discovered that the session tokens in EMC Secure Remote Services
Virtual Edition are Base64 encoded XML tokens that lack any
cryptographic protection. Due to this it is possible for attackers to
create their own session cookies. Attackers with network access
(insiders) to the ESRS Web Portal can exploit this issue to gain
unauthorized access to the management interface.


Affected versions

EMC reports that the following versions are affected by this
vulnerability:

- EMC Secure Remote Services Virtual Edition 3.02
- EMC Secure Remote Services Virtual Edition 3.03
- EMC Secure Remote Services Virtual Edition 3.04


See also

- CVE-2015-0544 [2]
- ESA-2015-097 [3]: EMC Secure Remote Services (ESRS) Virtual Edition
(VE) Multiple Security Vulnerabilities


Fix

EMC released EMC Secure Remote Services Virtual Edition 3.06 that
resolves this vulnerability. Registered EMC Online Support customers can
download patches and software from support.emc.com [4] at:

EMC Secure Remote Services -> EMC Secure Remote Services Virtual Edition
-> Downloads


Details

https://www.securify.nl/advisory/SFY20141115/weak_authentication_in_emc_secure_remote_services_virtual_edition_web_portal.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Insufficient certificate validation in EMC Secure Remote Services Virtual Edition

2015-08-17 Thread Securify B.V.


Insufficient certificate validation in EMC Secure Remote Services
Virtual Edition

Han Sahin, November 2014


Abstract

It was discovered that the server certificate validation checks
performed by EMC Secure Remote Services Virtual Edition are insecure.
Weak certificate validation allows attackers to perform a man in the
middle attack against ESRS connections. This allows for eavesdropping
on, and spoofing of provisioned devices in ESRS VE (including but not
limited to home calls to the ESRS portal esrs.emc.com).


Affected versions

EMC reports that the following versions are affected by this
vulnerability:

- EMC Secure Remote Services Virtual Edition 3.02
- EMC Secure Remote Services Virtual Edition 3.03
- EMC Secure Remote Services Virtual Edition 3.04


See also

- CVE-2015-0543 [2]
- ESA-2015-097 [3]: EMC Secure Remote Services (ESRS) Virtual Edition
(VE) Multiple Security Vulnerabilities


Fix

EMC released EMC Secure Remote Services Virtual Edition 3.06 that
resolves this vulnerability. Registered EMC Online Support customers can
download patches and software from support.emc.com [4] at:

EMC Secure Remote Services -> EMC Secure Remote Services Virtual Edition
-> Downloads


Details

https://www.securify.nl/advisory/SFY20141114/insufficient_certificate_validation_in_emc_secure_remote_services_virtual_edition.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Integer overflow in .NET Framework System.DirectoryServices.Protocols.Utility class

2015-07-25 Thread Securify B.V.


Integer overflow in .NET Framework
System.DirectoryServices.Protocols.Utility class

Yorick Koster, May 2015


Abstract

An integer overflow exists in the
System.DirectoryServices.Protocols.Utility class of the .NET Framework.
Triggering this issue results in an overflown integer that is used to
allocate a buffer on the heap that is too small, resulting in memory
corruption. Exploiting this issues appears to be difficult.
Consequently, Microsoft has decided to not release a security bulletin.


Affected versions

This issue affects .NET Framework version 4.5 and 4.6. Other versions
are not affected as this issue can only be triggered using large arrays
(> 2GB).


Fix

There is currently no fix available for this issue. Microsoft will not
release a security bulletin, it may be fixed in future versions of the
.NET Framework.

[...] [we] are going to pursue this as a candidate for improvement in
future versions, [...] On x86, the feasibility of an attack is mitigated
by the maximum process memory and even on amd64, prevailing
configurations preclude this from being a feasible attack.


Details

https://www.securify.nl/advisory/SFY20150501/integer_overflow_in__net_framework_system_directoryservices_protocols_utility_class.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Synology Photo Station multiple Cross-Site Scripting vulnerabilities

2015-05-25 Thread Securify B.V.


Synology Photo Station multiple Cross-Site Scripting vulnerabilities

Han Sahin, May 2015


Abstract

Multiple reflected Cross-Site scripting vulnerabilities were found in
Synology Photo Station. These issues allow attackers to perform a wide
variety of actions, such as stealing victims' session tokens or login
credentials if available, performing arbitrary actions on their behalf
but also performing arbitrary redirects to potential malicious websites.


Tested version

This issue was tested on Synology Photo Station version 6.2-2858.


Fix

Synology reports that this issue has been resolved in Photo Station
version 6.3-2945.
https://www.synology.com/en-us/releaseNote/PhotoStation


Details

https://www.securify.nl/advisory/SFY20150504/synology_photo_station_multiple_cross_site_scripting_vulnerabilities.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Reflected Cross-Site Scripting in Synology DiskStation Manager

2015-05-25 Thread Securify B.V.


Reflected Cross-Site Scripting in Synology DiskStation Manager

Han Sahin, May 2015


Abstract

A reflected Cross-Site scripting vulnerability was found in Synology
DiskStation Manager. This issue allows attackers to perform a wide
variety of actions, such as stealing victims' session tokens or login
credentials if available, performing arbitrary actions on their behalf
but also performing arbitrary redirects to potential malicious websites.


Tested version

This issue was tested on Synology DiskStation Manager version 5.2-5565.


Fix

Synology reports that this issue has been resolved in DiskStation
Manager version 5.2-5565 Update 1 (2015/05/21).
https://www.synology.com/en-global/releaseNote/DS214play


Details

https://www.securify.nl/advisory/SFY20150503/reflected_cross_site_scripting_in_synology_diskstation_manager.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Command injection vulnerability in Synology Photo Station

2015-05-25 Thread Securify B.V.


Command injection vulnerability in Synology Photo Station

Han Sahin, May 2015


Abstract

A command injection vulnerability was found in Synology Photo Station,
which allows an attacker to execute arbitrary commands with the
privileges of the webserver. An attacker can use this vulnerability to
compromise a Synology DiskStation NAS, including all data stored on the
NAS.


Tested version

This issue was tested on Synology Photo Station version 6.2-2858.


Fix

Synology reports that this issue has been resolved in Photo Station
version 6.3-2945.
https://www.synology.com/en-us/releaseNote/PhotoStation


Details

https://www.securify.nl/advisory/SFY20150502/command_injection_vulnerability_in_synology_photo_station.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Reflected Cross-Site Scripting vulnerability in asdoc generated documentation

2015-04-07 Thread Securify B.V.


Reflected Cross-Site Scripting vulnerability in asdoc generated
documentation

Radjnies Bhansingh, March 2014


Abstract

A reflected Cross-Site scripting vulnerability was found in Apache
Flex's asdoc generated API documentation. This issue allows attackers to
perform a wide variety of actions, such as stealing victims' session
tokens or login credentials if available, performing arbitrary actions
on their behalf but also performing arbitrary redirects to potential
malicious websites.


Affected products

Apache Flex reports that all versions of Apache Flex before 4.14.1 are
affected by this vulnerability.


Fix

The Apache Flex team fixed the issue in asdoc in Apache Flex 4.14.1.
Users can also manually apply the following patch to fix this issue
manually.
https://git-wip-us.apache.org/repos/asf/flex-sdk/repo?p=flex-sdk.git;a=commitdiff;h=151c6fa1e46529acb74c1baf056d431da1db0422

Users should upgrade their version of Apache Flex and regenerate their
current documentation generated with asdoc. Please note that any local
modification to the asdoc index.html will need to be saved as they are
not reapplied by asdoc on the newly generated documentation.


Details

https://www.securify.nl/advisory/SFY20150301/reflected_cross_site_scripting_vulnerability_in_asdoc_generated_documentation.html


___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Viber for Android exposes insecure Javascript interface

2015-03-20 Thread Securify B.V.


Viber for Android exposes insecure Javascript interface

Yorick Koster, April 2014


Abstract

It was discovered that Viber's Sticker Market is affected by a remote
code execution vulnerability. This is possible because the Market is
loaded over an insecure connection (HTTP) in a WebView that exposes an
insecure Javascript interface. Exploiting this issue allows for the
execution of arbitrary Java code within the privileges of the Viber app.


Tested versions

This issue was successfully tested on Viber for Android version
4.3.0.712.


Fix

As of Viber version 5.2.0.2415 (released December 15, 2014) the target
SDK was change from API Level 15 to API Level 19. Due to this, this
issue is no longer exploitable devices running Android 4.2 (API Level
17) and newer.


Details

https://www.securify.nl/advisory/SFY20140402/viber_for_android_exposes_insecure_javascript_interface.html
https://vimeo.com/102272421

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Citrix NetScaler VPX help pages are vulnerable to Cross-Site Scripting

2015-03-19 Thread Securify B.V.


Citrix NetScaler VPX help pages are vulnerable to Cross-Site Scripting

Han Sahin, August 2014


Abstract

It was discovered that the help pages of Citrix VPX are vulnerable to
Cross-Site Scripting. This issue allows attackers to perform a wide
variety of actions, such as stealing the victim's session token or login
credentials, performing arbitrary actions on the victim's behalf, and
logging their keystrokes.


Tested version

This issue was discovered in Citrix NetScaler VPX NSVPX-ESX-10.5-50.10,
other versions may also be vulnerable.


Fix

Citrix reports that this vulnerability is fixed in NetScaler 10.5 build
52.8nc.


Details

https://www.securify.nl/advisory/SFY20140807/citrix_netscaler_vpx_help_pages_are_vulnerable_to_cross_site_scripting.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Command injection vulnerability in Citrix NITRO SDK xen_hotfix page

2015-03-19 Thread Securify B.V.


Command injection vulnerability in Citrix NITRO SDK xen_hotfix page

Han Sahin, August 2014


Abstract

Securify discovered a command injection vulnerability in xen_hotfix page
of the NITRO SDK. The attacker-supplied command is executed with
elevated privileges (nsroot). This issue can be used to compromise of
the entire Citrix SDX appliance and all underling application's and
data.


Tested version

This issue was discovered in Citrix NetScaler SDX svm-10.5-50-1.9, other
versions may also be affected.


Fix

Citrix reports that this vulnerability is fixed in NetScaler 10.5 build
52.3nc.


Details

https://www.securify.nl/advisory/SFY20140806/command_injection_vulnerability_in_citrix_nitro_sdk_xen_hotfix_page.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Citrix NITRO SDK xen_hotfix page is vulnerable to Cross-Site Scripting

2015-03-19 Thread Securify B.V.


Citrix NITRO SDK xen_hotfix page is vulnerable to Cross-Site Scripting

Han Sahin, August 2014


Abstract

A Cross-Site Scripting vulnerability was found in the xen_hotfix page of
the Citrix NITRO SDK. This issue allows attackers to perform a wide
variety of actions, such as stealing the victim's session token or login
credentials, performing arbitrary actions on the victim's behalf, and
logging their keystrokes.


Tested version

This issue was discovered in Citrix NetScaler SDX svm-10.5-50-1.9;,
other versions may also be affected.


Fix

Citrix reports that this vulnerability is fixed in NetScaler 10.5 build
52.3nc.


Details

https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Advent JMX Servlet of Citrx Command Center is accessible to unauthenticated users

2015-03-19 Thread Securify B.V.


Advent JMX Servlet of Citrx Command Center is accessible to
unauthenticated users

Han Sahin, August 2014


Abstract

It was discovered that the Advent JMX Servlet of Citrix Command Center
is accessible to unauthenticated users. This issue can be abused by
attackers to comprise the entire application.


Tested version

This issue was discovered in Citrix Command Center 5.1 build 33.3
(including patch CC_SP_5.2_40_1.exe), other versions may also be
vulnerable.


Fix

Citrix reports that this vulnerability is fixed in Command Center 5.2
build 42.7, which can be downloaded from the following location (login
required).
https://www.citrix.com/downloads/command-center/product-software/command-center-52-427.html

Citrix assigned BUG0494204 to this issue.


Details

https://www.securify.nl/advisory/SFY20140804/advent_jmx_servlet_of_citrx_command_center_is_accessible_to_unauthenticated_users.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Citrix Command Center allows downloading of configuration files

2015-03-19 Thread Securify B.V.


Citrix Command Center allows downloading of configuration files

Han Sahin, August 2014


Abstract

It was discovered that Citrix Command Center stores configuration files
containing credentials of managed devices within a folder accessible
through the web server. Unauthenticated attackers can download any
configuration file stored in this folder, decode passwords stored in
these files, and gain privileged access to devices managed by Command
Center.


Tested version

This issue was discovered in Citrix Command Center 5.1 build 33.3
(including patch CC_SP_5.2_40_1.exe), other versions may also be
vulnerable.


Fix

Citrix reports that this vulnerability is fixed in Command Center 5.2
build 42.7, which can be downloaded from the following location (login
required).
https://www.citrix.com/downloads/command-center/product-software/command-center-52-427.html

Citrix assigned BUG0493933 to this issue.


Details

https://www.securify.nl/advisory/SFY20140802/citrix_command_center_allows_downloading_of_configuration_files.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] EMC Secure Remote Services Virtual Edition Provisioning component is affected by SQL injection

2015-03-18 Thread Securify B.V.


EMC Secure Remote Services Virtual Edition Provisioning component is
affected by SQL injection

Han Sahin, November 2014


Abstract

An SQL injection vulnerability was found in EMC Secure Remote Services
Virtual Edition (ESRS VE) that allows an attacker to retrieve arbitrary
data from the application, interfere with its logic, or execute commands
on the database server itself.


Affected versions

EMC reports that the following versions are affected by this
vulnerability:

- EMC Secure Remote Services Virtual Edition 3.02
- EMC Secure Remote Services Virtual Edition 3.03


See also

- CVE-2015-0524
- ESA-2015-040: EMC Secure Remote Services Virtual Edition Security
Update for Multiple Vulnerabilities


Fix

EMC released EMC Secure Remote Services Virtual Edition 3.04 that
resolves this vulnerability. Registered EMC Online Support customers can
download patches and software from support.emc.com at:

EMC Secure Remote Services -> EMC Secure Remote Services Virtual Edition
-> Downloads


Details

https://www.securify.nl/advisory/SFY20141113/emc_secure_remote_services_virtual_edition_provisioning_component_is_affected_by_sql_injection.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Command injection vulnerability in EMC Secure Remote Services Virtual Edition

2015-03-18 Thread Securify B.V.


Command injection vulnerability in EMC Secure Remote Services Virtual
Edition

Han Sahin, November 2014


Abstract

A command injection vulnerability was found in EMC Secure Remote
Services Virtual Edition (ESRS VE) that allows an attacker to execute
arbitrary system commands and take full control over ESRS VE.


Affected versions

EMC reports that the following versions are affected by this
vulnerability:

- EMC Secure Remote Services Virtual Edition 3.02
- EMC Secure Remote Services Virtual Edition 3.03


See also

- CVE-2015-0525
- ESA-2015-040: EMC Secure Remote Services Virtual Edition Security
Update for Multiple Vulnerabilities


Fix

EMC released EMC Secure Remote Services Virtual Edition 3.04 that
resolves this vulnerability. Registered EMC Online Support customers can
download patches and software from support.emc.com at:

EMC Secure Remote Services -> EMC Secure Remote Services Virtual Edition
-> Downloads


Details

https://www.securify.nl/advisory/SFY20141112/command_injection_vulnerability_in_emc_secure_remote_services_virtual_edition.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Path traversal vulnerability in EMC M&R (Watch4net) Device Discovery

2015-03-18 Thread Securify B.V.


Path traversal vulnerability in EMC M&R (Watch4net) Device Discovery

Han Sahin, November 2014


Abstract

A path traversal vulnerability was found in EMC M&R (Watch4net) Device
Discovery. This vulnerability allows an attacker to access sensitive
files containing configuration data, passwords, database records, log
data, source code, and program scripts and binaries.


Affected products

EMC reports that the following products are affected by this
vulnerability:

- EMC M&R (Watch4Net) versions prior 6.5u1
- EMC ViPR SRM versions prior to 3.6.1


See also

- CVE-2016-0516
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities


Fix

EMC released the following updated versions that resolve this
vulnerability:

- EMC M&R (Watch4Net) 6.5u1
- EMC ViPR SRM 3.6.1

Registered customers can download upgraded software from support.emc.com
at https://support.emc.com/downloads/34247_ViPR-SRM.


Details

https://www.securify.nl/advisory/SFY20141106/path_traversal_vulnerability_in_emc_m_r__watch4net__device_discovery.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Path traversal vulnerability in EMC M&R (Watch4net) MIB Browser

2015-03-18 Thread Securify B.V.


Path traversal vulnerability in EMC M&R (Watch4net) MIB Browser

Han Sahin, November 2014


Abstract

A path traversal vulnerability was found in EMC M&R (Watch4net) MIB
Browser. This vulnerability allows an attacker to access sensitive files
containing configuration data, passwords, database records, log data,
source code, and program scripts and binaries.


Affected products

EMC reports that the following products are affected by this
vulnerability:

- EMC M&R (Watch4Net) versions prior 6.5u1
- EMC ViPR SRM versions prior to 3.6.1


See also

- CVE-2015-0516
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities


Fix

EMC released the following updated versions that resolve this
vulnerability:

- EMC M&R (Watch4Net) 6.5u1
- EMC ViPR SRM 3.6.1

Registered customers can download upgraded software from support.emc.com
at https://support.emc.com/downloads/34247_ViPR-SRM.


Details

https://www.securify.nl/advisory/SFY20141105/path_traversal_vulnerability_in_emc_m_r__watch4net__mib_browser.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Cross-Site Scripting vulnerability in EMC M&R (Watch4net) Alerting Frontend

2015-03-18 Thread Securify B.V.


Cross-Site Scripting vulnerability in EMC M&R (Watch4net) Alerting
Frontend

Han Sahin, November 2014


Abstract

A Cross-Site Scripting vulnerability was found in EMC M&R (Watch4net)
Alerting Frontend. This issue allows attackers to perform a wide
variety of actions, such as stealing victims' session tokens or login
credentials, performing arbitrary actions on their behalf, logging their
keystrokes, or exploit issues in other areas of Watch4net.


Affected products

EMC reports that the following products are affected by this
vulnerability:

- EMC M&R (Watch4Net) versions prior 6.5u1
- EMC ViPR SRM versions prior to 3.6.1


See also

- CVE-2015-0513
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities


Fix

EMC released the following updated versions that resolve this
vulnerability:

- EMC M&R (Watch4Net) 6.5u1
- EMC ViPR SRM 3.6.1

Registered customers can download upgraded software from support.emc.com
at https://support.emc.com/downloads/34247_ViPR-SRM.


Details

https://www.securify.nl/advisory/SFY20141104/cross_site_scripting_vulnerability_in_emc_m_r__watch4net__alerting_frontend.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Cross-Site Scripting vulnerability in EMC M&R (Watch4net) Centralized Management Console

2015-03-18 Thread Securify B.V.


Cross-Site Scripting vulnerability in EMC M&R (Watch4net) Centralized
Management Console

Han Sahin, November 2014


Abstract

A Cross-Site Scripting vulnerability was found in EMC M&R (Watch4net)
Centralized Management Console. This issue allows attackers to perform a
wide variety of actions, such as stealing victims' session tokens or
login credentials, performing arbitrary actions on their behalf, logging
their keystrokes, or exploit issues in other areas of Watch4net.


Affected products

EMC reports that the following products are affected by this
vulnerability:

- EMC M&R (Watch4Net) versions prior 6.5u1
- EMC ViPR SRM versions prior to 3.6.1


See also

- CVE-2015-0513
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities


Fix

EMC released the following updated versions that resolve this
vulnerability:

- EMC M&R (Watch4Net) 6.5u1
- EMC ViPR SRM 3.6.1

Registered customers can download upgraded software from support.emc.com
at https://support.emc.com/downloads/34247_ViPR-SRM.


Details

https://www.securify.nl/advisory/SFY20141103/cross_site_scripting_vulnerability_in_emc_m_r__watch4net__centralized_management_console.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Cross-Site Scripting vulnerability in EMC M&R (Watch4net) Web Portal Report Favorites

2015-03-18 Thread Securify B.V.


Cross-Site Scripting vulnerability in EMC M&R (Watch4net) Web Portal
Report Favorites

Han Sahin, November 2014


Abstract

A Cross-Site Scripting vulnerability was found in EMC M&R (Watch4net)
Web Portal. This issue allows attackers to replace the report that is
shown at startup, the attackers payload will be stored in the user's
profile and will be executed  every time the victim logs in. The
attacker-supplied code can perform a wide variety of actions, such as
stealing victims' session tokens or login credentials, performing
arbitrary actions on their behalf, logging their keystrokes, or exploit
issues in other areas of Watch4net.


Affected products

EMC reports that the following products are affected by this
vulnerability:

- EMC M&R (Watch4Net) versions prior 6.5u1
- EMC ViPR SRM versions prior to 3.6.1


See also

- CVE-2015-0513
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities


Fix

EMC released the following updated versions that resolve this
vulnerability:

- EMC M&R (Watch4Net) 6.5u1
- EMC ViPR SRM 3.6.1

Registered customers can download upgraded software from support.emc.com
at https://support.emc.com/downloads/34247_ViPR-SRM.


Details

https://www.securify.nl/advisory/SFY20141102/cross_site_scripting_vulnerability_in_emc_m_r__watch4net__web_portal_report_favorites.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] EMC M&R (Watch4net) data storage collector credentials are not properly protected

2015-03-18 Thread Securify B.V.


EMC M&R (Watch4net) data storage collector credentials are not properly
protected

Han Sahin, November 2014


Abstract

It was discovered that EMC M&R (Watch4net) credentials of remote servers
stored in Watch4net are encrypted using a fixed hardcoded password. If
an attacker manages to obtain a copy of the encrypted credentials, it is
trivial to decrypt them.


Affected products

EMC reports that the following products are affected by this
vulnerability:

- EMC M&R (Watch4Net) versions prior 6.5u1
- EMC ViPR SRM versions prior to 3.6.1


See also

- CVE-2015-0514
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities


Fix

EMC released the following updated versions that resolve this
vulnerability:

- EMC M&R (Watch4Net) 6.5u1
- EMC ViPR SRM 3.6.1

Registered customers can download upgraded software from support.emc.com
at https://support.emc.com/downloads/34247_ViPR-SRM.


Details

https://www.securify.nl/advisory/SFY20141101/emc_m_r__watch4net__data_storage_collector_credentials_are_not_properly_protected.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Error messages of Websense Content Gateway are vulnerable to Cross-Site Scripting

2015-03-18 Thread Securify B.V.


Error messages of Websense Content Gateway are vulnerable to Cross-Site
Scripting

Han Sahin, September 2014


Abstract

It was discovered that the error messages of Websense Content Gateway
process user-controllable data insecurely, rendering these pages
vulnerable to Cross-Site Scripting. Cross-Site Scripting allows an
attacker to perform a wide variety of actions, such as stealing the
victim's session token or login credentials, performing arbitrary
actions on the victim's behalf, and logging their keystrokes.


Tested versions

This issue was discovered on Websense Triton v7.8.3 and Websense
appliance modules V-Series v7.7. Other versions may be affected as well.


Fix

This issue is resolved in TRITON APX Version 8.0. More information about
the fixed can be found at the following location:
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0


Details

https://www.securify.nl/advisory/SFY20140916/error_messages_of_websense_content_gateway_are_vulnerable_to_cross_site_scripting.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Multiple Cross-Site Scripting vulnerabilities in Websense Reporting

2015-03-18 Thread Securify B.V.


Multiple Cross-Site Scripting vulnerabilities in Websense Reporting

Han Sahin, September 2014


Abstract

It has been found that Websense Reporting is affected by multiple
Cross-Site Scripting issues. Cross-Site Scripting allows an attacker to
perform a wide variety of actions, such as stealing the victim's session
token or login credentials, performing arbitrary actions on the victim's
behalf, and logging their keystrokes.


Tested versions

This issue was discovered on Websense Triton v7.8.3 and Websense
appliance modules V-Series v7.7. Other versions may be affected as well.


Fix

Websense released hotfix 02 for Websense Triton v7.8.4 in which this
issue is fixed. More information about this hotfix can be found at the
following location:
http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-02-for-Web-Security-Solutions

This issue is resolved in TRITON APX Version 8.0. More information about
the fixed can be found at the following location:
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0


Details

https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Cross-Site Scripting vulnerability in Websense Explorer report scheduler

2015-03-18 Thread Securify B.V.


Cross-Site Scripting vulnerability in Websense Explorer report scheduler

Han Sahin, September 2014


Abstract

It was discovered that the report scheduler of Websense Explorer is
vulnerable to Cross-Site Scripting. Cross-Site Scripting allows an
attacker to perform a wide variety of actions, such as stealing the
victim's session token or login credentials, performing arbitrary
actions on the victim's behalf, and logging their keystrokes.


Tested versions

This issue was discovered on Websense Triton v7.8.3 and Websense
appliance modules V-Series v7.7. Other versions may be affected as well.


Fix

Websense released hotfix 02 for Websense Triton v7.8.4 in which this
issue is fixed. More information about this hotfix can be found at the
following location:
http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-02-for-Web-Security-Solutions

This issue is resolved in TRITON APX Version 8.0. More information about
the fixed can be found at the following location:
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0


Details

https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Cross-Site Scripting vulnerability in Websense Data Security block page

2015-03-18 Thread Securify B.V.


Cross-Site Scripting vulnerability in Websense Data Security block page

Han Sahin, September 2014


Abstract

It was discovered that the Websense Data Security block page processes
user-controllable data insecurely, rendering the block page is
vulnerable to Cross-Site Scripting. Cross-Site Scripting allows an
attacker to perform a wide variety of actions, such as stealing the
victim's session token or login credentials, performing arbitrary
actions on the victim's behalf, and logging their keystrokes.


Tested versions

This issue was discovered on Websense Triton v7.8.3 and Websense
appliance modules V-Series v7.7. Other versions may be affected as well.


Fix

This issue is resolved in TRITON APX Version 8.0. More information about
the fixed can be found at the following location:
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0


Details

https://www.securify.nl/advisory/SFY20140910/cross_site_scripting_vulnerability_in_websense_data_security_block_page.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Missing access control on Websense Explorer web folder

2015-03-18 Thread Securify B.V.


Missing access control on Websense Explorer web folder

Han Sahin, September 2014


Abstract

It was discovered that no access control is enforced on the explorer_wse
path, which is exposed through the web server. An attacker can abuse
this issue to download any file exposed by this path, including security
reports and Websense Explorer configuration files.


Tested versions

This issue was discovered on Websense Triton v7.8.3 and Websense
appliance modules V-Series v7.7. Other versions may be affected as well.


Fix

This issue is resolved in TRITON APX Version 8.0. More information about
the fixed can be found at the following location:
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0


Details

https://www.securify.nl/advisory/SFY20140909/missing_access_control_on_websense_explorer_web_folder.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Source code disclosure of Websense Triton JSP files via double quote character

2015-03-18 Thread Securify B.V.


Source code disclosure of Websense Triton JSP files via double quote
character

Han Sahin, September 2014


Abstract

Websense Triton is affected by a source code disclosure vulnerability.
By appending a double quote character after JSP URLs, Websense will
return the source code of the JSP instead of executing the JSP. An
attacker can use this issue to inspect parts of Websense's source code
in order to gain more knowledge about Websense's internals.


Tested versions

This issue was discovered on Websense Triton v7.8.3 and Websense
appliance modules V-Series v7.7. Other versions may be affected as well.


Fix

Websense released hotfix 02 for Websense Triton v7.8.4 in which this
issue is fixed. More information about this hotfix can be found at the
following location:
http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-02-for-Web-Security-Solutions

This issue is resolved in TRITON APX Version 8.0. More information about
the fixed can be found at the following location:
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0


Details

httpa://www.securify.nl/advisory/SFY20140907/source_code_disclosure_of_websense_triton_jsp_files_via_double_quote_character.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Command injection vulnerability in network diagnostics tool of Websense Appliance Manager

2015-03-18 Thread Securify B.V.


Command injection vulnerability in network diagnostics tool of Websense
Appliance Manager

Han Sahin, September 2014


Abstract

A command injection vulnerability was found in Websense Appliance
Manager that allows an attacker to execute arbitrary code on the
appliance. This issue can be combined with other vulnerabilities, like
Cross-Site Scripting, to perform a remote unauthenticated attacks to
compromise the appliance.


Tested versions

This issue was discovered on Websense Triton v7.8.3 and Websense
appliance modules V-Series v7.7. Other versions may be affected as well.


Fix

Websense released hotfix 02 for Websense Triton v7.8.4 in which this
issue is fixed. More information about this hotfix can be found at the
following location:
http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-02-for-Web-Security-Solutions

This issue is resolved in TRITON APX Version 8.0. More information about
the fixed can be found at the following location:
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0


Details

https://www.securify.nl/advisory/SFY20140906/command_injection_vulnerability_in_network_diagnostics_tool_of_websense_appliance_manager.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] Websense Email Security vulnerable to persistent Cross-Site Scripting in audit log details view

2015-03-18 Thread Securify B.V.


Websense Email Security vulnerable to persistent Cross-Site Scripting in
audit log details view

Han Sahin, September 2014


Abstract

Users of Websense Data Security that are reviewing DLP incidents can be
attacked via Cross-Site Scripting. This issue can be exploited using a
specially crafted email, or by sending a specially crafted HTTP request
through the Websense proxy. The attacker-supplied code can perform a
wide variety of attacks, such as stealing session tokens, login
credentials, performing arbitrary actions as victims, or logging
victims' keystrokes.


Tested versions

This issue was discovered on Websense Triton v7.8.3 and Websense
appliance modules V-Series v7.7. Other versions may be affected as well.


Fix

This issue is resolved in TRITON APX Version 8.0. More information about
the fixed can be found at the following location:
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0


Details

https://www.securify.nl/advisory/SFY20140905/websense_email_security_vulnerable_to_persistent_cross_site_scripting_in_audit_log_details_view.html

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


  1   2   >