Throughout November, I plan to release details on vulnerabilities I
found in web-browsers which I’ve not released before. This is the second
entry in that series.
The below information is also available on my blog at http://blog.skylined.nl/20161102001.html. There you can find a repro
that triggered this issue in addition to the information below.
Throughout November, I plan to release details on vulnerabilities I
found in web-browsers which I’ve not released before. This is the first
entry in that series.
The below information is also available on my blog at http://blog.skylined.nl/20161101001.html. There you can find a repro
that triggered this issue in addition to the information below.
Follow me on twitter.com/berendjanwever for daily browser bugs.
A PHP object injection vulnerability exists in multiple widget files
due to the unsafe use of the unserialize() function. The affected
files include flow_chart.php, gauge.php, honeypot.php,…
A stored XSS vulnerability exists in the User-Agent header of the
login process. It’s possible to inject a script into that header that
then gets executed when mousing over the User-Agent field in…
A SQL injection vulnerability exists in the value parameter of
/ossim/dashboard/sections/widgets/data/gauge.php on line 231. By
sending a serialized array with a SQL query in the type field, it’s
possible to…
Multiple GET parameters in the vulnerability scan scheduler of
OSSIM/USM before 5.3.2 are vulnerable to reflected XSS. The parameters
include jobname, timeout, sched_id, and targets[] in
/ossim/vulnmeter/sched.php….