Category Archives: Full Disclosure

Full Disclosure

phpwind v8.7 Unvalidated Redirects and Forwards Web Security Vulnerabilities

Posted by Jing Wang on May 24

*phpwind v8.7 Unvalidated Redirects and Forwards Web Security
Vulnerabilities*

Exploit Title: phpwind v8.7 goto.php? &url Parameter Open Redirect Security
Vulnerabilities
Product: phpwind
Vendor: phpwind
Vulnerable Versions: v8.7
Tested Version: v8.7
Advisory Publication: May 24, 2015
Latest Update: May 24, 2015
Vulnerability Type: URL Redirection to Untrusted Site (‘Open Redirect’)
[CWE-601]
CVE Reference: *
Impact CVSS Severity…

phpwind v8.7 XSS (Cross-site Scripting) Web Security Vulnerabilities

Posted by Jing Wang on May 24

*phpwind v8.7 XSS (Cross-site Scripting) Web Security Vulnerabilities*

Exploit Title: phpwind v8.7 goto.php? &url Parameter XSS Security
Vulnerabilities
Product: phpwind
Vendor: phpwind
Vulnerable Versions: v8.7
Tested Version: v8.7
Advisory Publication: May 25, 2015
Latest Update: May 25, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version 2.0):
CVSS v2 Base Score: 4.3 (MEDIUM)…

SITEFACT CMS XSS (Cross-site Scripting) Web Security Vulnerabilities

Posted by Jing Wang on May 24

*SITEFACT CMS XSS (Cross-site Scripting) Web Security Vulnerabilities*

Exploit Title: SITEFACT CMS content.php? &id Parameter XSS Security
Vulnerabilities
Product: SITEFACT CMS (Content Management System)
Vendor: SITEFACT
Vulnerable Versions: version 2.01
Tested Version: version 2.01
Advisory Publication: May 24, 2015
Latest Update: May 24, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version…

Gcon Tech Solutions v1.0 SQL Injection Web Security Vulnerabilities

Posted by Jing Wang on May 24

*Gcon Tech Solutions v1.0 SQL Injection Web Security Vulnerabilities*

Exploit Title: Gcon Tech Solutions v1.0 content.php? &id Parameter SQL
Injection Security Vulnerabilities
Product: Gcon Tech Solutions
Vendor: Gcon Tech Solutions
Vulnerable Versions: v1.0
Tested Version: v1.0
Advisory Publication: May 24, 2015
Latest Update: May 24, 2015
Vulnerability Type: Improper Neutralization of Special Elements used in an
SQL Command (‘SQL…

Gcon Tech Solutions v1.0 XSS (Cross-site Scripting) Web Security Vulnerabilities

Posted by Jing Wang on May 24

*Gcon Tech Solutions v1.0 XSS (Cross-site Scripting) Web Security
Vulnerabilities*

Exploit Title: Gcon Tech Solutions v1.0 content.php? &id Parameter XSS
Security Vulnerabilities
Product: Gcon Tech Solutions
Vendor: Gcon Tech Solutions
Vulnerable Versions: v1.0
Tested Version: v1.0
Advisory Publication: May 23, 2015
Latest Update: May 23, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version…

Broken, Abandoned, and Forgotten Code, Part 5

Posted by Zach C on May 22

Part 5 is up. In this and the next several parts we start analyzing
the structure of Netgear R6200 firmware updates. We switch over to the
HTTP daemon because it’s less broken and a little easier to analyze
than upnpd.

The overall goal is to reverse engineer the firmware format so we can
generate a malicious firmware image to use when exploiting the
SetFirmware SOAP action described in parts 1-4.

Binary patching, emulating with QEMU, and…

call for paper(information retrieval, privacy)

Posted by Hongkai Wu on May 22

Workshop on Privacy-Preserving Information Retrieval, held in conjunction
with the ACM SIGIR conference (August 13, 2015; Santiago de Chile)

Submission Deadline: June 5, 2015.
Acceptance Notifications: June 15, 2015
Camera-ready Deadline: June 22, 2015
Workshop: August 13, 2015
Submission types: Long papers (max. 4 pages in ACM SIG format),
Position papers (max. 2 pages in ACM SIG format)

Workshop format: Keynote speech, paper presentations,…

Hue 3.7.1 Local Privilege Escalation

Posted by Henri Salo on May 22

Hue project responded in two different messages:

“””
This is not changed, the Hue project provides this command as a helper,

this is up to the packaging distribution to change the permissions of/move

the files accordingly.
“””

“””
Actually, the root…

0day Mailbird XSS

Posted by Henri Salo on May 22

I created inquiry about this issue to their support and got two replies:

Leonardo Santoso, May 11, 12:50:
We are investigating this issue right now, I’ll let you know once we know more
about it. Thank you for notifying us about it.

Leonardo Santoso, May 21, 17:50: This issue should be fix in the latest version,
please update your Mailbird.

Latest version after downloading the application is 2.0.16.0 dated as May 15,
which is still…