Информационная безопасность
[RU] switch to English


Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:10 декабря 2012 г.
Источник:
SecurityVulns ID:12763
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:SQUIZ : Squiz CMS 11654
 SYSAID : SysAid Helpdesk 8.5
 MODX : MODx 1.0
 ACHIEVO : Achievo 1.4
 CLIPBUCKET : ClipBucket
 TINYMCPUK : tinymcpuk 0.3
 MANAGEENGINE : Manage Engine Exchange Reporter 4.1
 WORDPRESS : Wordpress Facebook Survey 1
 MANAGEENGINE : ManageEngine ServiceDesk 8.0
 WORDPRESS : Simple Slider 1.0
 DOTPROJECT : dotProject 2.1
 BTNET : BugTracker.Net 3.5
 WORDPRESS : Video Lead Form 0.5
 SILVERSTRIPE : SilverStripe CMS 3.0
CVE:CVE-2012-6313 (simple-gmail-login.php in the Simple Gmail Login plugin before 1.1.4 for WordPress allows remote attackers to obtain sensitive information via a request that lacks a timezone, leading to disclosure of the installation path in a stack trace.)
 CVE-2012-6312 (Cross-site scripting (XSS) vulnerability in the Video Lead Form plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via the errMsg parameter in a video-lead-form action to wp-admin/admin.php.)
 CVE-2012-5866 (Cross-site scripting (XSS) vulnerability in include.php in Achievo 1.4.5 allows remote attackers to inject arbitrary web script or HTML via the field parameter.)
 CVE-2012-5865 (SQL injection vulnerability in dispatch.php in Achievo 1.4.5 allows remote authenticated users to execute arbitrary SQL commands via the activityid parameter in a stats action.)
 CVE-2012-5849 (Multiple SQL injection vulnerabilities in ClipBucket 2.6 Revision 738 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) uid parameter in an add_friend action to ajax.php; id parameter in a (2) share_object, (3) add_to_fav, (4) rating, or (5) flag_object action to ajax.php; cid parameter in an (6) add_new_item, (7) remove_collection_item, (8) get_item, or (9) load_more_items action to ajax.php; (10) ci_id parameter in a get_item action to ajax.php; user parameter to (11) user_contacts.php or (12) view_channel.php; (13) pid parameter to view_page.php; (14) tid parameter to view_topic.php; or (15) v parameter to watch_video.php.)
 CVE-2012-5702 (Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to index.php. NOTE: the date parameter vector is already covered by CVE-2008-3886.)
 CVE-2012-5701 (Multiple SQL injection vulnerabilities in dotProject before 2.1.7 allow remote authenticated administrators to execute arbitrary SQL commands via the (1) search_string or (2) where parameter in a contacts action, (3) dept_id parameter in a departments action, (4) project_id[] parameter in a project action, or (5) company_id parameter in a system action to index.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.)
Оригинальный текстdocumentNCC Group Research, NGS000241 Technical Advisory: SysAid Helpdesk Pro Blind SQL Injection (10.12.2012)
 documentNCC Group Research, NGS000330 Technical Advisory: Squiz CMS File Path Traversal (10.12.2012)
 documentlists_(at)_senseofsecurity.com, SilverStripe CMS - Multiple Vulnerabilities - Security Advisory - SOS-12-011 (10.12.2012)
 documentEmmanuel FARCY, Wordpress Plugin Simple Gmail Login Stack Trace Vulnerability (10.12.2012)
 documentEmmanuel FARCY, Video Lead Form Plugin Cross-Site Scripting Vulnerabilities which affects Wordpress URL (10.12.2012)
 documentdefensecode_(at)_defensecode.com, [DC-2012-11-002] DefenseCode ThunderScan ASP.Net C# Advisory: BugTracker.Net Multiple Security Vulnerabilities (10.12.2012)
 documentHigh-Tech Bridge Security Research, Multiple vulnerabilities in dotProject (10.12.2012)
 documentEmmanuel FARCY, XSS Vulnerability in Simple Slider Wordpress Plugin (10.12.2012)
 documentVulnerability Lab, ManageEngine ServiceDesk 8.0 - Multiple Vulnerabilities (10.12.2012)
 documentVulnerability Lab, Wordpress Facebook Survey v1 - SQL Injection Vulnerability (10.12.2012)
 documentVulnerability Lab, Manage Engine Exchange Reporter v4.1 - Multiple Web Vulnerabilites (10.12.2012)
 documentadmin_(at)_eidelweiss.info, tinymcpuk xss vulnerability (10.12.2012)
 documentHigh-Tech Bridge Security Research, Multiple vulnerabilities in Achievo (10.12.2012)
 documentEmmanuel FARCY, Fwd: SQL injection (10.12.2012)
 documentEmmanuel FARCY, Update on CVE assigned for Video Lead Form Plugin Cross-Site (10.12.2012)
 documentEmmanuel FARCY, Update on CVE assigned for Wordpress Plugin Simple Gmail Login (10.12.2012)
 documentMustLive, BF and FPD vulnerabilities in MODx (10.12.2012)
 documentMustLive, XSS vulnerability in swfupload in TinyMCE, SPIP, Radiant CMS, AionWeb, Liferay Portal, SurgeMail, symfony (10.12.2012)
 documentMustLive, XSS vulnerability in swfupload in TYPO3 CMS, TinyMCE, Liferay Portal, Drupal, Codeigniter, SentinelleOnAir (10.12.2012)
 documentMustLive, CSRF, AoF, DoS and IAA vulnerabilities in MODx (10.12.2012)
 documentSteevee a.k.a Stefanus, Site Builder RumahWeb Arbitrary Config File Disclosure Vulnerability (10.12.2012)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород