Thursday, 29. September 2011
Joomla 1.7.0 - XSS
VULNERABILITY DESCRIPTION

Several parameters (searchword, extension, asset, author ) in Joomla!
Core components are not properly sanitized upon submission to the
/index.php url, which allows attacker to conduct Cross Site Scripting
attack. This may allow an attacker to create a specially crafted URL
that would execute arbitrary script code in a victim's browser.

Source
http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.7.0-stable%5D_cross_site_scripting%28XSS%29

Permalink

 


Friday, 23. September 2011
Clickjacking For Shells

Permalink

 


Bypassing Internet Explorer's XSS Filter
By default Internet Explorer 9 has a security system to help prevent Reflective XSS attacks. There are well known shortfalls of this system, most notably that it does not attempt to address DOM based XSS or Stored XSS. This security system is built on an arbitrary philosophy which only accounts for the most straight forward of reflective XSS attacks[1]. This paper is covering three attack patterns that undermine Internet Explorer’s ability to prevent Reflective XSS. These are general attack patterns that are independent of Web Application platform.


Download PDF
https://sitewat.ch/files/Bypassing%20Internet%20Explorer%27s%20XSS%20Filter.pdf

Permalink

 


Android vulnerabilities
The first vulnerability is known as a “Permission escalation vulnerability”, and allows attackers to install additional “arbitrary applications with arbitrary permissions”, without first asking the user if they want to permit such actions. This would allow attackers to access call records, texts, web browsing history and media stored on the device.
The second bug only affects the Samsung Nexus S smartphone. It lets attackers gain root access on the device, providing them with full control over the handset. Google has yet to address the security issues.

Permalink

 


Tuesday, 20. September 2011
TSRC - Application level attack
TSRC - Application level attack
Session Race Conditions and Session Puzzling

A few months ago Shay Chen, Senior Manager at Hacktics Advanced Security Center (HASC) published a paper about Session Puzzling, a new application level attack vector of critical severity and numerous uses, but for some bizarre reasons, most of the responses I got was that the attack was too complicated to comprehend all it once.

The project home page (presentation, whitepaper, training kit)
http://code.google.com/p/puzzlemall/

The following movies demonstrate a few simple TSRC attacks:

Exploiting Temporal Session Race Conditions via Connection Pool Consumption:
http://www.youtube.com/watch?v=woWECWwrsSk

Exploiting Temporal Session Race Conditions via RegEx DoS:
http://www.youtube.com/watch?v=3k_eJ1bcCro

Permalink

 


Sunday, 18. September 2011
SpyEye Botnet - SQL
Exploit :
Vulnn type : Blind SQL injection
vuln script : frm_cards_edit.php
Affected version : ALL
May use any botnet from : https://spyeyetracker.abuse.ch/monitor.php

Download
http://pastebin.com/F46U8zwK

by
S4(uR4

Permalink

 


Thursday, 15. September 2011
webadmin - Shell Upload Vulnerability
Google Dork: intitle:"webadmin.php"
Download: http://wacker-welt.de/webadmin/webadmin.php.gz

by
Caddy-Dz

http://pastebin.com/6YbK7STU

Permalink

 


Saturday, 10. September 2011
adobe-website - xss
http://www.adobe.com/cfusion/tdrc/modal/download_suite.cfm?product=XSS

http://www.adobe.com/cfusion/tdrc/modal/signin.cfm?product=XSS

http://www.adobe.com/cfusion/type/search.cfm?category_type=All&term=XSS

http://groups.adobe.com/index.cfm?event=people.login&redirect=XSS

https://tv.adobe.com/login/login?redirect=XSS

http://www.adobe.com/products/creativesuite/mastercollection/buying-guide.html/XSS

by
Josh

Permalink

 


Friday, 9. September 2011
Ajex File Manager - Deface Or Shell Upload
Google Dork:

- intitle: Ajex.FileManager
- inurl: /plugins/editors/AjexFileManager/
*Think it again

Exploit:
- http://[localhost]/patch/plugins/editors/ajexfilemanager/index.html

Live Target:
- http://fiesta-kurkino.ru/scripts/AjexFileManager/
- http://demphest.ru/demo/AjexFileManager/AjexFileManager/index.html

by
Setelah Membaca, Ayo Berbagi

Permalink

 


Friday, 2. September 2011
eBuddy Web Messenger - XSS
eBuddy Web Messenger suffers from an encoded-Persistent XSS vulnerability in the messaging function. (while sendingA message with embedded code to another authorized user in eBuddy WebMessenger).

Exploit example
Plain XSS (Not going to store, nor execute)
alert('eBuddy Persistent XSS');
Encoded
text=%3Cscript%3Ealert%28'eBuddy%20Persistent%20XSS'%29%3C/script%3E
[*] The attacker sends the encoded embedded code in an IM message.

[*] The victim receives the message with the encoded embedded code and it executes on the victims browser.

by
Warv0x

Permalink