SEANux version 1.0 remote command execution exploit that executes as www-data.
Monthly Archives: February 2015
CVE-2014-6412 – WordPress (all versions) lacks CSPRNG
Posted by Scott Arciszewski on Feb 12
Ticket opened: 2014-06-25
Affected Versions: ALL
Problem: No CSPRNG
Patch available, collecting dust because of negligent (and questionably
competent) WP maintainers
On June 25, 2014 I opened a ticked on WordPress’s issue tracker to expose a
cryptographically secure pseudorandom number generator, since none was
present (although it looks like others have tried to hack together a
band-aid solution to mitigate php_mt_seed until WordPress gets…
MooPlayer 1.3.0 'm3u' SEH Buffer Overflow POC
Posted by Samandeep Singh on Feb 12
MooPlayer 1.3.0 ‘m3u’ SEH Buffer Overflow POC
#!/usr/bin/env python
##########################################################################################
# Exploit Title: MooPlayer 1.3.0 ‘m3u’ SEH Buffer Overflow POC
# Date Discovered: 09-02-2015
# Exploit Author: Samandeep Singh (@samanL33T )
# Vulnerable Software: Moo player 1.3.0
# Software Link: https://mooplayer.jaleco.com/
# Vendor site:…
WordPress Ninja Forms 2.8.8 Cross Site Scripting
WordPress Ninja Forms plugin version 2.8.8 suffers from a cross site scripting vulnerability.
Re: Suspicious URL:Re: Major Internet Explorer Vulnerability – NOT Patched
Posted by Christoph Gruber on Feb 12
I love “Suspicious URL”.
It reminds me the microsoft KB article speaking of “Malicious Hyperlink”
“The most effective step that you can take to help protect yourself from malicious hyperlinks is not to click them.”
in http://support.microsoft.com/kb/833786/en-us
Radexscript CMS 2.2.0 – SQL Injection vulnerability
Posted by ITAS Team on Feb 12
#Vulnerability title: Radexscript CMS 2.2.0 – SQL Injection vulnerability
#Vendor: http://redaxscript.com/
#Product: Radexscript CMS
#Software link: http://redaxscript.com/download/releases
#Affected version: Redaxscript 2.2.0
#Fixed version: Redaxscript 2.3.0
#CVE ID: CVE-2015-1518
#Author: Pham Kien Cuong (cuong.k.pham () itas vn) & ITAS Team (www.itas.vn)
:: PROOF OF CONCEPT ::
POST /redaxscript/ HTTP/1.1
Host: target.local
User-Agent:…
Red Hat Security Advisory 2015-0158-01
Red Hat Security Advisory 2015-0158-01 – Red Hat Enterprise Virtualization Manager is a visual tool for centrally managing collections of virtual servers running Red Hat Enterprise Linux and Microsoft Windows. This package also includes the Red Hat Enterprise Virtualization Manager API, a set of scriptable commands that give administrators the ability to perform queries and operations on Red Hat Enterprise Virtualization Manager. The Manager is a JBoss Application Server application that provides several interfaces through which the virtual environment can be accessed and interacted with, including an Administration Portal, a User Portal, and a Representational State Transfer Application Programming Interface .
Ubuntu Security Notice USN-2499-1
Ubuntu Security Notice 2499-1 – Stephen Frost discovered that PostgreSQL incorrectly displayed certain values in error messages. An authenticated user could gain access to seeing certain values, contrary to expected permissions. Andres Freund, Peter Geoghegan and Noah Misch discovered that PostgreSQL incorrectly handled buffers in to_char functions. An authenticated attacker could possibly use this issue to cause PostgreSQL to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
Red Hat Security Advisory 2015-0218-01
Red Hat Security Advisory 2015-0218-01 – Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the RESTEasy DocumentProvider did not set the external-parameter-entities and external-general-entities features appropriately, thus allowing external entity expansion. A remote attacker able to send XML requests to a RESTEasy endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XML eXternal Entity attacks.
Red Hat Security Advisory 2015-0215-01
Red Hat Security Advisory 2015-0215-01 – Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the RESTEasy DocumentProvider did not set the external-parameter-entities and external-general-entities features appropriately, thus allowing external entity expansion. A remote attacker able to send XML requests to a RESTEasy endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XML eXternal Entity attacks.