=============================================
MGC ALERT 2016-003
– Original release date: April 14, 2016
– Last revised: July 14, 2016
– Discovered by: Manuel García Cárdenas
– Severity: 7,1/10 (CVSS Base Score)
=============================================
I. VULNERABILITY
————————-
Blind SQL Injection PivotX <= v2.3.11
II. BACKGROUND
————————-
PivotX is an open source blog software written in PHP using…
Summary:
——–
pmount is a wrapper around the standard mount program which permits
normal users to mount removable devices without a matching /etc/fstab
entry.
Due to a missing input validation check local users could mount devices
to arbitrary destinations and thus taking over the targeted system
completely.
Prerequisites:
————–
Local user access to the target
Pmount 0.9.23 or older to be installed (any version at time of writing…
This seems more like an argument to not use DA accounts for NAC,
rather than a sure-fire method to undermine NAC.
I’ve not used NAC, but I’d have to guess that the machine wanting
access to the network has to announce itself by name, at least.
If that’s the case, how hard would it be to use the local
administrator account of the machine requesting admission? Assuming
that MSFT LAPS (or some similar system, such as the one from…
Sorry for the resend, I change the format of the email to better fit the list…
——————————————————————–
User Enumeration using Open SSHD (<=Latest version).
——————————————————————-
Abstract:
———–
By sending large passwords, a remote user can enumerate users on system that runs SSHD. This problem exists in most
modern configuration due to the…