[KIS-2015-07] ATutor <= 2.2 (popuphelp.php) Reflected Cross-Site Scripting Vulnerability

Posted by Egidio Romano on Nov 04

————————————————————————–
ATutor <= 2.2 (popuphelp.php) Reflected Cross-Site Scripting Vulnerability
————————————————————————–

[-] Software Link:

http://www.atutor.ca/

[-] Affected Versions:

Version 2.2 and prior versions.

[-] Vulnerability Description:

The vulnerable code is located in the /popuphelp.php script:

26. if…

Risk report update: April to October 2015

Picture of risk playing cardsIn April 2015 we took a look at a years worth of branded vulnerabilities, separating out those that mattered from those that didn’t. Six months have passed so let’s take this opportunity to update the report with the new vulnerabilities that mattered across all Red Hat products.

ABRT (April 2015) CVE-2015-3315:

ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect defects in applications and to create a bug report. ABRT was vulnerable to multiple race condition and symbolic link flaws. A local attacker could use these flaws to potentially escalate their privileges on an affected system to root.

This issue affected Red Hat Enterprise Linux 7 and updates were made available. A working public exploit is available for this issue. Other products and versions of Enterprise Linux were either not affected or not vulnerable to privilege escalation.

JBoss Operations Network open APIs (April 2015) CVE-2015-0297:

Red Hat JBoss Operations Network is a middleware management solution that provides a single point of control to deploy, manage, and monitor JBoss Enterprise Middleware, applications, and services. The JBoss Operations Network server did not correctly restrict access to certain remote APIs which could allow a remote, unauthenticated attacker to execute arbitrary Java methods. We’re not aware of active exploitation of this issue. Updates were made available.

“Venom” (May 2015) CVE-2015-3456:

Venom was a branded flaw which affected QEMU. A privileged user of a guest virtual machine could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host’s QEMU process corresponding to the guest.

A number of Red Hat products were affected and updates were released. Red Hat products by default would block arbitrary code execution as SELinux sVirt protection confines each QEMU process.

“LogJam” (May 2015) CVE-2015-4000:

TLS connections using the Diffie-Hellman key exchange protocol were found to be vulnerable to an attack in which a man-in-the-middle attacker could downgrade vulnerable TLS connections to weak cryptography which could then be broken to decrypt the connection.

Like Poodle and Freak, this issue is hard to exploit as it requires a man in the middle attack. We’re not aware of active exploitation of this issue. Various packages providing cryptography were updated.

BIND DoS (July 2015) CVE-2015-5477:

A flaw in the Berkeley Internet Name Domain (BIND) allowed a remote attacker to cause named (functioning as an authoritative DNS server or a DNS resolver) to exit, causing a denial of service against BIND.

This issue affected the versions of BIND shipped with all versions of Red Hat Enterprise Linux. A public exploit exists for this issue. Updates were available the same day as the issue was public.

libuser privilege escalation (July 2015) CVE-2015-3246:

The libuser library implements a interface for manipulating and administering user and group accounts. Flaws in libuser could allow authenticated local users with shell access to escalate privileges to root.

Red Hat Enterprise Linux 6 and 7 were affected and updates available same day as issue was public. Red Hat Enterprise Linux 5 was affected and a mitigation was published.  A public exploit exists for this issue.

Firefox lock file stealing via PDF reader (August 2015) CVE-2015-4495:

A flaw in Mozilla Firefox could allow an attacker to access local files with the permissions of the user running Firefox. Public exploits exist for this issue, including as part of Metasploit, and targeting Linux systems.

This issue affected Firefox shipped with versions of Red Hat Enterprise Linux and updates were available the next day after the issue was public.

Firefox add-on permission warning (August 2015) CVE-2015-4498:

Mozilla Firefox normally warns a user when trying to install an add-on if initiated by a web page.  A flaw allowed this dialog to be bypassed.

This issue affected Firefox shipped with Red Hat Enterprise Linux versions and updates were available the same day as the issue was public.

Conclusion

The issues examined in this report were included because they were meaningful.  This includes the issues that are of a high severity and are likely easy to be exploited (or already have a public working exploit), as well as issues that were highly visible or branded (with a name or logo), regardless of their severity.

Between 1 April 2015 and 31 October 2015 for every Red Hat product there were 39 Critical Red Hat Security Advisories released, addressing 192 Critical vulnerabilities.  Aside from the issues in this report which were rated as having Critical security impact, all other issues with a Critical rating were part of Red Hat Enterprise Linux products and were browser-related: Firefox, Chromium, Adobe Flash, and Java (due to the browser plugin).

Our dedicated Product Security team continue to analyse threats and vulnerabilities against all our products every day, and provide relevant advice and updates through the customer portal. Customers can call on this expertise to ensure that they respond quickly to address the issues that matter.  Hear more about vulnerability handling in our upcoming virtual event: Secure Foundations for Today and Tomorrow.

Mozilla Releases Security Updates for Firefox and Firefox ESR

Original release date: November 04, 2015

The Mozilla Foundation has released security updates to address vulnerabilities in Firefox and Firefox ESR. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.

Available updates include:

  • Firefox 42
  • Firefox ESR 38.4

US-CERT encourages users and administrators to review the Security Advisories for Firefox and Firefox ESR and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.

CESA-2015:1980 Critical CentOS 5 nss SecurityUpdate

CentOS Errata and Security Advisory 2015:1980 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1980.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
38808b3fa862cbf3146a917de81ad391528ed4872d7231c1777735b51e2a8794  nss-3.19.1-2.el5_11.i386.rpm
744297616c874f705f828d1744b28a99fea922fdc3818df39290b834d63c4a60  nss-devel-3.19.1-2.el5_11.i386.rpm
626a061c678a2534b5818085441b2d0e6f393592fa55b877103b5be93c78f097  nss-pkcs11-devel-3.19.1-2.el5_11.i386.rpm
ce2f8597f1d13f54b10c2fd08370d0c329f3c3916d4c21e154ae971eb8ccc0ba  nss-tools-3.19.1-2.el5_11.i386.rpm

x86_64:
38808b3fa862cbf3146a917de81ad391528ed4872d7231c1777735b51e2a8794  nss-3.19.1-2.el5_11.i386.rpm
d344be4b182d196106bba963eb89c4862b09a1b73a65da5152d68752d85a53b2  nss-3.19.1-2.el5_11.x86_64.rpm
744297616c874f705f828d1744b28a99fea922fdc3818df39290b834d63c4a60  nss-devel-3.19.1-2.el5_11.i386.rpm
128fd113c675b62c87411331e6a23b4b534b463814f06246015782ffcbf8800e  nss-devel-3.19.1-2.el5_11.x86_64.rpm
626a061c678a2534b5818085441b2d0e6f393592fa55b877103b5be93c78f097  nss-pkcs11-devel-3.19.1-2.el5_11.i386.rpm
61d185ce85fb93ae0141c82159bdbb35139ff18b48333bb3ad17ad7113fac64e  nss-pkcs11-devel-3.19.1-2.el5_11.x86_64.rpm
3923ee36ec998be847bee6ca6a36bf65160cc32eea171142ee97fd25ccff2eba  nss-tools-3.19.1-2.el5_11.x86_64.rpm

Source:
b6773faf9dda2bfec6b5074368f1e882dbb323b77ac802fb78a8e912fba3855e  nss-3.19.1-2.el5_11.src.rpm



CESA-2015:1980 Critical CentOS 5 nspr SecurityUpdate

CentOS Errata and Security Advisory 2015:1980 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1980.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
cdfdabe4bf562b8bdeeee4258192978d236849a86d03bcfe38fc44e315f996ed  nspr-4.10.8-2.el5_11.i386.rpm
253d80bc77bba0ebe2e6ca9d01653d824ef648eb23d17f0c9a8af42772cb021d  nspr-devel-4.10.8-2.el5_11.i386.rpm

x86_64:
cdfdabe4bf562b8bdeeee4258192978d236849a86d03bcfe38fc44e315f996ed  nspr-4.10.8-2.el5_11.i386.rpm
b870e21f63ce781a9c4a95d8492ece4a6b96ce5d0f7043ed35a9b9c3c3291fd7  nspr-4.10.8-2.el5_11.x86_64.rpm
253d80bc77bba0ebe2e6ca9d01653d824ef648eb23d17f0c9a8af42772cb021d  nspr-devel-4.10.8-2.el5_11.i386.rpm
ae25311678196ab09a546c42e464e336b1ae8a8bbecb4006598f71b4b87fefc4  nspr-devel-4.10.8-2.el5_11.x86_64.rpm

Source:
268d9e54a39262db90a153cac8c7a9271cda922ea8522c98e4eeaa1fb2992d2b  nspr-4.10.8-2.el5_11.src.rpm



CESA-2015:1978 Moderate CentOS 7 kernel SecurityUpdate

CentOS Errata and Security Advisory 2015:1978 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1978.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
c9ade58eacc16d4e13685a756b61b5792f49410927e77b3b9620c41ee271d9fa  kernel-3.10.0-229.20.1.el7.x86_64.rpm
a01e218973ffdeda31da3e2aa508961bf3a0ea376738489f018cca2414f380e1  kernel-abi-whitelists-3.10.0-229.20.1.el7.noarch.rpm
92f4fb5c2b6f20826821531dea8c0197dbde4d3173b63b9cafec3a3e5bb32a4a  kernel-debug-3.10.0-229.20.1.el7.x86_64.rpm
d7929f79af6f31a338868000149da37f78cf873bb7d93b845a0c49cf6030a23a  kernel-debug-devel-3.10.0-229.20.1.el7.x86_64.rpm
8b4c3d3d641548f66c7406a03ff8f263f8478895d72320ae060ba5ac5a427259  kernel-devel-3.10.0-229.20.1.el7.x86_64.rpm
44a539adfd10114a4cb4083222ea2a00e97792ba3c587b0f2b55f73d79a9b029  kernel-doc-3.10.0-229.20.1.el7.noarch.rpm
27b0427e9bd7f7c0f099040266918aa5689d0914b188e628614fa9367f4be24e  kernel-headers-3.10.0-229.20.1.el7.x86_64.rpm
64210dfcdc34e8aa4460ab0edcea171169236171fe7a96d2bb709d996993e542  kernel-tools-3.10.0-229.20.1.el7.x86_64.rpm
f73912dad278ca62acd6d7af08ce6bdf6eae4fbb445531ba12ad424a186b057e  kernel-tools-libs-3.10.0-229.20.1.el7.x86_64.rpm
5d6de6fa8b48898c92bbf9f233ced6f2ab2a37ef71279f10f347017f57387789  kernel-tools-libs-devel-3.10.0-229.20.1.el7.x86_64.rpm
36f05a2121d09b721d03d4930226023ce70c5c0ffd839c56bb249b086b9b2d55  perf-3.10.0-229.20.1.el7.x86_64.rpm
9c7eab757f79cb64b9400e28ccc27f77e931cc8abd3b25fd53bc898678567073  python-perf-3.10.0-229.20.1.el7.x86_64.rpm

Source:
69f6c98b3a23c012f7c86a10a81016069cdc80c658d8660ab2725cb20f394369  kernel-3.10.0-229.20.1.el7.src.rpm



Bugtraq: [security bulletin] HPSBGN03386 rev.2 – HP Central View Fraud Risk Management, Revenue Leakage Control, Dealer Performance Audit, Credit Risk Control, Roaming Fraud Control, Subscription Fraud Prevention, Remote Disclosure of Information, Local Disclosure

[security bulletin] HPSBGN03386 rev.2 – HP Central View Fraud Risk Management, Revenue Leakage Control, Dealer Performance Audit, Credit Risk Control, Roaming Fraud Control, Subscription Fraud Prevention, Remote Disclosure of Information, Local Disclosure