After a brief intermission last week, the Broken, Abandoned series is
back with part 8. In this part, we switch back to analyzing the
Netgear R6200 upnpd, since that’s the ultimate focus of this series.
The mystery firmware header gets a name. Also the buffer overflow
discussed in part 5 is back, this time without authentication.
[-] Description
A malicious user can be able to bypass some of SpiderOak filters and retrieve sensitive information from database.
Revealing system data helps an adversary learn about the system and form a plan of attack.
Title: Authentication bypass in OpenEMR
CVE Reference: CVE-2015-4453
Product: OpenEMR
Vendor: http://www.open-emr.org/
Tested versions: 4.2.0 and 4.2.0 patch 1
Affected versions: 2.8.3 to 4.2.0 patch 1
Status: Fixed by vendor
Reported by: Brian D. Hysell
Details:
A bug in OpenEMR’s implementation of “fake register_globals” in
interface/globals.php allows an attacker to bypass authentication by
sending ignoreAuth=1 as a GET or…
we’re very pleased to announce that NorthSec 2015 Conference Recordings are
now available for free on YouTube, including talks about Privacy, Malware,
Reverse Engineering, Cryptography, Bitcoins and many more :
Web Application Security Report
m.ebay.com Multiple Vulnerabilities
[1]: Cross-site Scripting – Stored XSS
The iOS, Android application and m.ebay.com website has a section called
“Followed Search” These followed search, by default, are pre-defined links to sections of eBay. It is possible for a
user to edit the list of followed search and to add their own