RootExplorer remote code execution

Posted by 0x3d5157636b525761 iddqd on Jul 12

Disclosure timeline
=====================
June 11th: discovered issues.
June 12th: contacted App developer.
June 12th: App developer replies that the new App is not ready yet, but
will not download assets from HTTP.
June 13th: asked how much time it’ll take to fix, App developer didn’t
respond.
July 2nd: App developer queried again, but failed to respond.
July 8th: App developer got his 3rd notice, but failed to respond.
July 9th: full…

RCE by abusing NAC to gain Domain Persistence.

Posted by Alexander Korznikov on Jul 12

link:
http://www.korznikov.com/2016/07/rce-by-abusing-nac-to-gain-domain.html

Hi there!
I want to share how to compromise whole enterprise network in less than ONE
minute 🙂

Let’s begin… As security consultants, we often advice to our clients to
implement Network Access Control systems to prevent some nasty people to do
their nasty things…

This article is not about how to bypass Network Access Control systems, but
if you’re…

WSO2 SOA Enablement Server – Server Side Request Forgery

Posted by Paweł Gocyla on Jul 12

Title: WSO2 SOA Enablement Server – Server Side Request Forgery
Authors: Pawel Gocyla
Date: 10. June 2016

Affected Software:
==================
WSO2 SOA Enablement Server for Java/6.6 build SSJ-6.6-20090827-1616
Probably other versions are also vulnerable.

Vulnerability:
**************

Server Side Request Forgery (SSRF):
===================================

Using this vulnerability it is possible for example to expose service user
credentials….

WSO2 SOA Enablement Server – XML External Entity Injection

Posted by Paweł Gocyla on Jul 12

Title: WSO2 SOA Enablement Server – XML External Entity Injection
Authors: Pawel Gocyla, Jakub Palaczynski
Date: 08. June 2016

Affected Software:
==================
WSO2 SOA Enablement Server for Java/6.6 build SSJ-6.6-20090827-1616
Probably other versions are also vulnerable.

Vulnerability:
**************

XML External Entity Injection:
==============================

It must be noted that this vulnerability is exploitable without…

WSO2 SOA Enablement Server – Reflected Cross Site Scripting vulnerability

Posted by Paweł Gocyla on Jul 12

Title: WSO2 SOA Enablement Server – Reflected Cross Site Scripting
Authors: Pawel Gocyla
Date: 08. June 2016

Affected Software:
==================
WSO2 SOA Enablement Server for Java/6.6 build SSJ-6.6-20090827-1616
Probably other versions are also vulnerable.

Vulnerability:
**************

Reflected Cross Site Scripting:
==============================

Proof of Concept:
https://WSO2SOA_IP:6443/invocationConsole?p.wsdlUrl=

[RCESEC-2016-003][CVE-2016-4469] Apache Archiva 1.3.9 Multiple Cross-Site Request Forgeries

Posted by Julien Ahrens on Jul 12

RCE Security Advisory
https://www.rcesecurity.com

1. ADVISORY INFORMATION
=======================
Product: Apache Archiva
Vendor URL: https://archiva.apache.org
Type: Cross-Site Request Forgery [CWE-253]
Date found: 2016-05-31
Date published: 2016-07-11
CVSSv3 Score: 5.4 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)
CVE: CVE-2016-4469

2. CREDITS
==========
This vulnerability was discovered and researched…

[RCESEC-2016-004][CVE-2016-5005] Apache Archiva 1.3.9 admin/addProxyConnector_commit.action connector.sourceRepoId Persistent Cross-Site Scripting

Posted by Julien Ahrens on Jul 12

RCE Security Advisory
https://www.rcesecurity.com

1. ADVISORY INFORMATION
=======================
Product: Apache Archiva
Vendor URL: https://archiva.apache.org
Type: Cross-Site Scripting [CWE-79]
Date found: 2016-05-31
Date published: 2016-07-11
CVSSv3 Score: 5.5 (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N)
CVE: CVE-2016-5005

2. CREDITS
==========
This vulnerability was discovered and researched by…

[CVE-2016-1014, CVE-2016-4247] Executable installers are vulnerable^WEVIL (case 35): Adobe's Flash Player (un)installers

Posted by Stefan Kanthak on Jul 12

Hi @ll,

the executable installers of Flash Player released 2016-06-15
fixed CVE-2016-1014 in the second attempt, but another vulnerability
remained: they create(d) and use(d) UNSAFE temporary subdirectories
into which they copy/ied themselves and extract(ed) a file “fpb.tmp”
which they load(ed) and execute(d) later with elevated privileges.

An unprivileged user can/could overwrite both files between creation
and execution and gain…

Microsoft Releases Security Updates

Original release date: July 12, 2016

Microsoft has released 11 updates to address vulnerabilities in Microsoft software. Exploitation of one of these vulnerabilities could allow a remote attacker to take control of an affected system.

US-CERT encourages users and administrators to review Microsoft Security Bulletins MS16-084 through MS16-094 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.