Title: ====== Swoopo Gold Shop CMS v8.4.56 - Multiple Web Vulnerabilities Date: ===== 2012-05-14 References: =========== http://www.vulnerability-lab.com/get_content.php?id=515 VL-ID: ===== 515 Common Vulnerability Scoring System: ==================================== 8.5 Introduction: ============= Swoopo Gold is a shop content management system coded with PHP, Jsp & connected via MySQL Database. Scratch Auction. Future Auction. Buy-now system. Bid-back System. Referral System. Offline order processing. Change shipping status from Admin-Panel. Captcha at registration. Display bid-type at bid history. Display return-policy in auction details page. Advance Autobidder. Banner rotator. 1 year free technical support. No Encryption. No Callback. Standard Auction, Penny Auction, Beginner Auction, 10 Second Auction, 15 Second Auction, 20 Second Auction User registration and account verification. Member login, account updating, purchasing more bids and paying for won auctions features. Buying bid packages. Set bidding packages. Bidding in the Penny Auction format. Pay per bid and the price increment by a set amount. Time increment by 10 seconds (can be changed in the CMS) each time a bid is placed. Bid butler system - the ability for users tobook their bids. An editable “Terms and conditions” and “Help section” page. Additional pages can also be incorporated. A newsletter sign up system and sending capability. Update & add the latest news articles. Send newsletters to members signed up for the newsletter. Paypal as the default payment gateway. Users can receive free bids for registering, for winning their first auction and for buying bid packages for the first time. View, edit, add, delete and suspend users. Add, edit, delete and clone Limits on the number of auctions a user can win. Winning bidder can be viewed and the auction status can be update - e.g. paid, awaiting shipping, shipped and completed. View users bidding history, purchased bid packages, add free bids to the user and refund bids for the user. View referrals from users. Coupons module. Rewards points system when packages are purchased. Credit system for auctions which users lose, which can be used for won auctions. Manage unlimited website categories viz. add, edit and delete. Edit general website settings viz. turning on and off various features. Add, edit and delete countries that you want to include. (Copy of the Vendor Homepage: http://itechscripts.com/swoopo_clone.html ) Abstract: ========= The Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in ITtechScripts Swoopo Gold Shop CMS v8.4.56. Report-Timeline: ================ 2012-05-14: Public or Non-Public Disclosure Status: ======== Published Affected Products: ================== ITechScripts Product: Swoopo Gold Shop CMS v8.4.56 Exploitation-Technique: ======================= Remote Severity: ========= Critical Details: ======== Details about the bug on http://www.vulnerability-lab.com/get_content.php?id=515 Risk: ===== 1.1 The security risk of the remote sql injection vulnerability is estimated as critical. 1.2 The security risk of the blind sql injection vulnerability is estimated as critical. 2.1 The security risk of the persistent input validation vulnerabilities are estimated as medium(+). 2.2 The security risk of the non-persistent cross site scripting vulnerabilities are estimated as low(+). Credits: ======== Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (Rem0ve) & Ibrahim El-Sayed (the St0rm) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Domains: www.vulnerability-lab.com - www.vuln-lab.com Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com Contact: admin@vulnerability-lab.com - support@vulnerability-lab.com - irc.vulnerability-lab.com Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. Copyright © 2012 Vulnerability-Lab
Security Zone !!
Monday, 14 May 2012
Swoopo Gold Shop CMS v8.4.56 - Multiple Web Vulnerabilities
Friday, 11 May 2012
NetBill Billing System v1.2 - Multiple Web Vulnerabilities
Title:
======
NetBill Billing System v1.2 - Multiple Web Vulnerabilities
Date:
=====
2012-05-11
References:
===========
http://www.vulnerability-lab.com/get_content.php?id=560
VL-ID:
=====
560
Common Vulnerability Scoring System:
====================================
3.5
Introduction:
=============
NetBill - Client Control & Billing System - NetBill is an open source web application optimized to
fuse customer support, project management, communications, and direct billing to enhance conversions
and service management. Integrated within the core of the NetBill platform is well-thought automation
and user centric functionality that is pre-configured to selectively enhance your operations
and productivity.
(Copy of the vendor Homepage: http://www.vessio.com )
Abstract:
=========
The Vulnerability Laboratory Research Team discovered a CSRF- and multiple persistent Web
Vulnerabilities in the NetBill v1.2 web application.
Report-Timeline:
================
2012-05-11: Public or Non-Public Disclosure
Status:
========
Published
Exploitation-Technique:
=======================
Remote
Severity:
=========
Medium
Details:
========
1.1
Multiple persistent input validation vulnerabilities are detected in the NetBill v1.2 web application.
The bugs
allow remote attackers to implement/inject malicious script code on the application side (persistent).
Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent)
context manipulation.
Exploitation requires low user inter action.
Vulnerable Module(s):
[+] /accounts/admin/index.php?user=59902561 - user Full Name
[+] /accounts/admin/index.php?user=59902561 - add file (Title - Description)
[+] /accounts/index2.php?page=support - Inject via support request (Details)
Picture(s):
../1.png
../2.png
../3.png
1.2
A cross site request forgery vulnerability is detected in in NetBill v1.2 web application. The bugs allow remote attackers with
high required user inter action to edit user accounts. Successful exploitation can lead to account creation. To exploit
the issue the attacker need to create a manipulated copy the edit user mask/form. Inside of the document the remote
can implement his own values for the update because of no form or token protection. When admin get now forced to execute
the script via link he is executing the new value on the update of the application if his session is not expired.
Vulnerable Module(s):
[+] /accounts/admin/index.php?action=new-client - Add New Account
Picture(s):
../4.png
Risk:
=====
1.1
The security risk of the persistent input validation vulnerability is estimated as medium.
1.2
The security risk of the cross site request forgery vulnerability is estimated as low(+).
Credits:
========
Vulnerability Laboratory [Research Team] - the_storm (storm@vulnerability-lab.com)
Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation
may not apply.
Domains: www.vulnerability-lab.com - www.vuln-lab.com
Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com
Contact: admin@vulnerability-lab.com - support@vulnerability-lab.com - irc.vulnerability-lab.com
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of
other media, are reserved by Vulnerability-Lab Research Team or its suppliers.
Copyright © 2012 Vulnerability-Lab
Travelon Express CMS v6.2.2 - Multiple Web Vulnerabilities
This summary is not available. Please
click here to view the post.
Wednesday, 9 May 2012
Proman Xpress v5.0.1 - Multiple Web Vulnerabilities
Title: ====== Proman Xpress v5.0.1 - Multiple Web Vulnerabilities Date: ===== 2012-05-09 References: =========== http://www.vulnerability-lab.com/get_content.php?id=513 VL-ID: ===== 512 Common Vulnerability Scoring System: ==================================== 7.5 Introduction: ============= Proman Xpress v5.0.1 is a super project management script coded in PHP & MySQL. It s highly customizable and is used across industries. No Encryption. No Callback. Separate login for clients. Easy management. Add/edit/delete projects. Unlimited project category. Unlimited image upload. Ajax based interface. Complete messaging system. File attachment system. Active/ inactive projects. Assign different parts to staffs. Client to admin message interface. Staff to admin message interface. Set project time period. Add/edit/delete clients. Add/edit/delete Staffs. Template based architecture. (Copy of the Vendor Homepage: http://itechscripts.com/proman_xpress.html ) Abstract: ========= The Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in Proman Xpress 2012 Q2. Report-Timeline: ================ 2012-05-09: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= High Details: ======== 1.1 A remote SQL Injection vulnerability is detected in the Promans Xpress 2012 Q2 content management system. The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise. The vulnerability is located on the username post method. Vulnerable Module(s): [+] Category Edit [category_edit.php?cid=] Picture(s): ../1.png ../2.png 1.2 A persistent input validation vulnerability is detected n the Promans Xpress 2012 Q2 content management system. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. The bug is located on the comment section of the message reply function. Vulnerable Module(s): [+] Replying for a Message - Comments Picture(s): ../3.png ../4.png Risk: ===== 1.1 The security risk of the sql injection vulnerability is estimated as high(-). 1.2 The security risk of the persistent input validation vulnerability is estimated as medium(+). Credits: ======== Vulnerability Laboratory [Research Team] - the storm (storm@vulnerability-lab.com) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Domains: www.vulnerability-lab.com - www.vuln-lab.com Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com Contact: admin@vulnerability-lab.com - support@vulnerability-lab.com - irc.vulnerability-lab.com Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. Copyright © 2012 Vulnerability-Lab
Monday, 7 May 2012
Free Reality v3.1-0.6 - Multiple Web Vulnerabilities
Title: ====== Free Reality v3.1-0.6 - Multiple Web Vulnerabilities Date: ===== 2012-05-07 References: =========== http://www.vulnerability-lab.com/get_content.php?id=513 VL-ID: ===== 513 Common Vulnerability Scoring System: ==================================== 7.5 Introduction: ============= Free Realty is primarily designed for real estate agents and offices to list properties on the internet. With Free Realty the end user does not need to be fluent in web page design. Read more in the demo site This is a fork of software written by Jon Roig called Open Realty. Jon has moved on to version 3.0 while a number of users have requested continued development on the 2.x series. Other sites of note regarding 2.x development www.1axn.com/gi-bin/openforum/ikonboard.cgi the original discussion board, before Jon opened up his own. (Copy of the Vendor Homepage: http://freerealty.rwcinc.net ) Abstract: ========= A Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in the Free Reality v3.1-0.6 web application. Report-Timeline: ================ 2012-05-07: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= Critical Details: ======== 1.1 A remote SQL Injection vulnerability is detected in the Free Reality v3.1-0.6 web application. The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise. Vulnerable Module(s): [+] agentdisplay.php?view= [+] /admin/admin.php?edit= 1.2 Multiple persistent input validation vulnerabilities are detected in the Free Reality v3.1-0.6 web application. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. Vulnerable Module(s): [+] admin/agenteditor.php - inject notes about the Agent [+] agentadmin.php?edit=2 - inject title / preview description: / Long description: / notes [+] agentadmin.php?action=addlisting inject title / preview description: / Long description: / notes [+] admin/adminfeatures.php - Add new feature 1.3 A cross site request forgery vulnerability is detected in in the Free Reality v3.1-0.6 web application. The bugs allow remote attackers with high required user inter action to edit user accounts. Successful exploitation can lead to account access. To exploit the issue the attacker need to create a manipulated copy the edit user mask/form. Inside of the document the remote can implement his own values for the update because of no form or token protection. When admin get now forced to execute the script via link he is executing the new value on the update of the application if his session is not expired. Vulnerable Module(s): [+] admin/agenteditor.php?action=addagent - Add agent [+] admin/agenteditor.php?adminmodify=2 - Modify Agent Risk: ===== 1.1 The security risk of the remote SQL injection vulnerability is estimated as critical. 1.2 The security risk of the persistent input validation vulnerability is estimated as medium. 1.3 The security risk of the cross site request forgery vulnerability is estimated as low(+). Credits: ======== Vulnerability Laboratory [Research Team] - the_storm (storm@vulnerability-lab.com) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Domains: www.vulnerability-lab.com - www.vuln-lab.com Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com Contact: admin@vulnerability-lab.com - support@vulnerability-lab.com - irc.vulnerability-lab.com Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. Copyright © 2012 Vulnerability-Lab
Tuesday, 1 May 2012
MYRE Real Estate Mobile 2012|2 - Multiple Web Vulnerabilities
Title: ====== MYRE Real Estate Mobile 2012|2 - Multiple Web Vulnerabilities Date: ===== 2012-05-01 References: =========== http://www.vulnerability-lab.com/get_content.php?id=516 VL-ID: ===== 516 Introduction: ============= Best solution for a professional Real Estate management software. Try MYRE Real Estate Mobile Software, Real Estate ready-to-use software best solution for a professional Real Estate management software. Try MYRE Real Estate Software, Real Estate ready-to-use software. At MYRE Real Estate Software, we offer professional solutions for your Real Estate business needs, including turn-key operations. That\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'s right, turn-key! Start your real estate business today with MYRE Real Estate Mobile Software and get into the real estate market the same day. Businesses for sale Commercial properties for lease Commercial properties for sale Real estate properties for sale Real estate properties for rent Holiday rentals Or any combination MYRE Real Estate Software provides a complete realty listing management solution. It is easily customized to reflect your creativity whether you are starting from scratch or integrating it into an existing web site. MYRE Real Estate Software can be used to promote residential as well as commercial rentals. This software is suitable for an independent agent site, or the listings section of your brokerage and/or real estate agency web site. (Copy of the Vendor Homepage: http://www.myrephp.com & http://myrephp.com/realestate/1_mobile/ ) Abstract: ========= The Vulnerability Laboratory Researcher Team discovered multiple Vulnerabilities in MYREs Real Estate Mobile Application (2012 Q2). Report-Timeline: ================ 2012-05-01: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= Critical Details: ======== 1.1 Multiple remote SQL Injection vulnerabilities are detected in MYREs Real Estate Mobile Application (2012 Q2). The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise. The vulnerability is located on the link_idd & userid value of the mobile application. Vulnerable Module(s): [+] Listings - Link_IDD [+] Agent Profile - UserID Picture(s): ../1.png ../2.png 1.2 Multiple non persistent cross site scripting vulnerabilities are detected in MYREs Real Estate Mobile Application (2012 Q2). The vulnerability allows remote attackers to hijack website customer, moderator or admin sessions with high required user inter action or local low privileged user account. Successful exploitation can result in account steal, phishing & client-side content request manipulation. Vulnerable Module(s): [+] Search - bedrooms1 [+] Search - price2 Picture(s): ../3.png ../4.png Risk: ===== 1.1 The security risk of the sql injection vulnerabilities are estimated as critical. 1.2 The security risk of the non persistent cross site scripting vulnerabilities are estimated as low(+). Credits: ======== Vulnerability Laboratory [Research Team] - Ibrahim M. El-Sayed [the_storm] (the_storm@mail.com) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright © 2012 Vulnerability-Lab
Format Factory - Multiple Buffer Overflow Vulnerabilities[Video Tutorial]
This is my first BOF bug. Thank you Benjamen (rem0ve).
I really appreciate your help :) Thank you bro
I really appreciate your help :) Thank you bro
Title: ====== Format Factory - Multiple Buffer Overflow Vulnerabilities Date: ===== 2012-05-01 References: =========== Download: http://www.vulnerability-lab.com/resources/videos/539.wmv View: http://www.youtube.com/watch?v=Attyl__UIjY Article: http://www.vulnerability-lab.com/get_content.php?id=539 VL-ID: ===== 539 Status: ======== Published Exploitation-Technique: ======================= Offensiv Severity: ========= Critical Details: ======== The following video has been produced by Ibrahim El-Sayed & Benjamin Kunz Mejri. The video is about how to identify different local stack- & buffer overflow vulnerabilities in the format factory software. The video is splitted in 2 parts of exploitation. 1. Local Buffer overflow without overwrite registers 2. Local Buffer Overflow with overwrite ECX registers 3. Local Stack Buffer Overflow with overwrite EIP registers The video teach you how to discover different type of local buffer overflows. Enjoy the video & send it to your friends to share experience. Credits: ======== Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (Rem0ve) Disclaimer: =========== The information provided in this video is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright © 2012 Vulnerability-Lab
Subscribe to:
Posts (Atom)