Advisory: Cross-Site Scripting in IBM Endpoint Manager Relay Diagnostics
Page
During a penetration test, RedTeam Pentesting discovered that the IBM
Endpoint Manager Relay Diagnostics page allows anybody to persistently
store HTML and JavaScript code that is executed when the page is opened
in a browser.
Details
=======
Product: IBM Endpoint Manager
Affected Versions: 9.1.x versions earlier than 9.1.1229,
9.2.x…
When I tried to reproduce it using code hosted on one of my domains, I
tried three variations of what I assumed at the time the PHP code from
the original was:
I’m able to get the hacked page on IE9 after changing the document mode from Quirks to IE9 Standards. Screenshot
attached. I’m sure you could get around having to manually switch the document mode with the appropriate DOCTYPE set in
the exploit html page.
David, could you share the contents of “1.php”? I’m assuming it is a delayed re-direct to the target’s domain? I am
unable to reproduce the…
Responder for Windows is meant to propagate further compromises from a
Windows workstation/server.
Features includes:
– Be able to propagate (pivoting) compromises across subnets and domains
from any compromised Windows machine ranging from Windows 2000 to 8.1,
Server 2012R2.
– This tool can also be used to compromise a domain from an external
penetration test.
– This version will disable NetBIOS on all interfaces and the current
firewall…
LG On Screen Phone authentication bypass vulnerability
——————————————————
SEARCH-LAB Ltd. discovered a serious security vulnerability in the On
Screen Phone protocol used by LG Smart Phones. A malicious attacker is
able to bypass the authentication phase of the network communication,
and thus establish a connection to the On Screen Phone application
without the owner’s knowledge or consent. Once connected,…