in <http://seclists.org/fulldisclosure/2013/Sep/132> I showed an
elaborated way for privilege elevation using IExpress (and other
self-extracting) installers containing *.MSI or *.MSP which works
“in certain situations”.
Introduction
*********************************************************************************
Using Advantech WebAccess SCADA Software we can remotely manage Industrial
Control systems devices like RTU’s, Generators, Motors etc. Attackers can
execute code remotely by passing maliciously crafted string to
ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX.
Operating System: Windows SP1
Affected Product: Advantech WebAccess 8.0, 3.4.3…
Create a malicious DLL and rename as anyone of the below DLL’s.
UxTheme.dll
CtComDlgENU.dll
CtComDlgLOC.dll
CTPROJENU.dll
CTPROJLOC.dll
CRYPTBASE.dll
SspiCli.dll
profapi.dll
dnsapi.dll
located at
C:Program FilesSchneider ElectricCitectSCADA 7.40Bin
Vulnerable Process Name, CtExplor.exe
The malicious DLL’s will have arbitrary code written by attacker.
Tested on OS: Windows 7 Ultimate N SP1
Schneider Electric CitectSCADA 7.40
Hopefully I can save someone else from having to deal with the
frustration of dealing with Bullhorn.
March 3, 2014 – I observed that SendOuts (owned by Bullhorn) didn’t
use HTTPS even though it was available, nor HSTS once someone
explicitly accessed the https://webconnect3.sendouts.com URL.
When I went to notify them on their support forums, I noticed they
were running an ancient version of phpBB. A version known to be…
Vendor: Checkmarx – www.checkmarx.com
Product: CxSuite
Version affected: 7.1.5 and prior
Credit: Huy-Ngoc DAU (@ngocdh) of Deloitte Conseil, France
================================
Introduction
================================
Checkmarx is a static source code analysis suite (https://www.checkmarx.com).
CxQL (Checkmarx Query Language) is a CSharp-based language defined by Checkmarx to query source…
A weakness in the dynamic loader have been found, Glibc prior to 2.22.90
are affected. The issue is that the LD_POINTER_GUARD in the environment
is not sanitized allowing local attackers easily to bypass the pointer
guarding protection on set-user-ID and set-group-ID programs.