Monthly Archives: October 2014
Joomla Akeeba Kickstart Unserialize Remote Code Execution
This Metasploit module exploits a vulnerability found in Joomla! through 2.5.25, 3.2.5 and earlier 3.x versions and 3.3.0 through 3.3.4 versions. The vulnerability affects the Akeeba component, which is responsible for Joomla! updates. Nevertheless it is worth to note that this vulnerability is only exploitable during the update of the Joomla! CMS.
Numara / BMC Track-It! FileStorageService Arbitrary File Upload
This Metasploit module exploits an arbitrary file upload vulnerability in Numara / BMC Track-It! v8 to v11.X. The application exposes the FileStorageService .NET remoting service on port 9010 (9004 for version 8) which accepts unauthenticated uploads. This can be abused by a malicious user to upload a ASP or ASPX file to the web root leading to arbitrary code execution as NETWORK SERVICE or SYSTEM. This Metasploit module has been tested successfully on versions 11.3.0.355, 10.0.51.135, 10.0.50.107, 10.0.0.143, 9.0.30.248 and 8.0.2.51.
HP Data Protector EXEC_INTEGUTIL Remote Code Execution
This exploit abuses a vulnerability in the HP Data Protector. The vulnerability exists in the Backup client service, which listens by default on TCP/5555. The EXEC_INTEGUTIL request allows to execute arbitrary commands from a restricted directory. Since it includes a perl executable, it’s possible to use an EXEC_INTEGUTIL packet to execute arbitrary code. On linux targets, the perl binary isn’t on the restricted directory, but an EXEC_BAR packet can be used to access the perl binary, even in the last version of HP Data Protector for linux. This Metasploit module has been tested successfully on HP Data Protector 9 over Windows 2008 R2 64 bits and CentOS 6 64 bits.
Windows OLE Package Manager SandWorm Exploit
Proof of concept exploit builder for the OLE flaw in packager.dll.
Asterisk Project Security Advisory – AST-2014-011
Asterisk Project Security Advisory – Asterisk suffered from the SSL POODLE vulnerability.
Apple Security Advisory 2014-10-20-2
Apple Security Advisory 2014-10-20-2 – Apple TV 7.0.1 is now available and addresses bluetooth and SSL 3.0 related security vulnerabilities.
Apple Security Advisory 2014-10-20-1
Apple Security Advisory 2014-10-20-1 – iOS 8.1 is now available and addresses bluetooth, insufficient cryptographic protection, and various other vulnerabilities.
LiteCart 1.1.2.1 Cross Site Scripting
LiteCart version 1.1.2.1 suffers from cross site scripting vulnerabilities.
Red Hat Security Advisory 2014-1669-02
Red Hat Security Advisory 2014-1669-02 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU’s VGA emulator accessed frame buffer memory for high resolution displays. A privileged guest user could use this flaw to leak memory contents of the host to the guest by setting the display to use a high resolution in the guest. This issue was discovered by Laszlo Ersek of Red Hat.