I’ve identified a volnurability in some ecommerce websites, that seems to
come from the fact that all of them use a 3rd party checkout system called
Borderfree (www.borderfree.com).
According to their website, Borderfree’s technology allows websites to show
prices to automatically foreign customers in their foreign currency, pay
taxes and duties and other things. They also replace the website’s checkout
page with their own…
ERPSCAN Research Advisory [ERPSCAN-15-013] SAP NetWeaver AS Java CIM
UPLOAD – XXE
Application: SAP NetWeaver AS Java
Versions Affected: SAP NetWeaver AS Java 7.4, probably others
Vendor URL: http://SAP.com
Bugs: XML External Entity
Sent: 16.06.2014
Reported: 17.06.2014
Vendor response: 17.06.2014
Date of Public Advisory: 17.08.2015
Reference: SAP Security Note 2090851
Author: Vahagn Vardanyan…
Yes, this does indeed only affect older versions of PHP – I’m sorry if that wasn’t clear in our advisory. Check the
“mitigations” section: “ensure that you are using a recent version of php (at least 5.3)”
Lin Hua Cheng discovered that a session could be created when anonymously
accessing the django.contrib.auth.views.logout view. This could allow
remote attackers to saturate the session store or cause other users’
session records to be evicted.
Gustavo Grieco discovered a heap overflow in the processing of BMP images
which may result in the execution of arbitrary code if a malformed image
is opened.
The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users’ accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.