Информационная безопасность
[RU] switch to English


Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
дополнено с 17 мая 2015 г.
Опубликовано:18 мая 2015 г.
Источник:
SecurityVulns ID:14499
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:SIDU : Sidu 5.2
 WSO2 : WSO2 Identity Server 5.0
 LOXONE : Loxone Smart Home 6.4
 WEBINDIASOLUTION : Web India Solutions CMS 2015
 CONCRETE5 : Concrete5 CMS 5.7
 PHPMYADMIN : phpMyAdmin 4.4
CVE:CVE-2015-3903 (libraries/Config.class.php in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 disables X.509 certificate verification for GitHub API calls over SSL, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.)
 CVE-2015-2250 (Multiple cross-site scripting (XSS) vulnerabilities in concrete5 before 5.7.4 allow remote attackers to inject arbitrary web script or HTML via the (1) banned_word[] parameter to index.php/dashboard/system/conversations/bannedwords/success, (2) channel parameter to index.php/dashboard/reports/logs/view, (3) accessType parameter to index.php/tools/required/permissions/access_entity, (4) msCountry parameter to index.php/dashboard/system/multilingual/setup/load_icon, arHandle parameter to (5) design/submit or (6) design in index.php/ccm/system/dialogs/area/design/submit, (7) pageURL to index.php/dashboard/pages/single, (8) SEARCH_INDEX_AREA_METHOD parameter to index.php/dashboard/system/seo/searchindex/updated, (9) unit parameter to index.php/dashboard/system/optimization/jobs/job_scheduled, (10) register_notification_email parameter to index.php/dashboard/system/registration/open/1, or (11) PATH_INFO to index.php/dashboard/extend/connect/.)
Оригинальный текстdocumentSEC Consult Vulnerability Lab, SEC Consult SA-20150514-0 :: Multiple vulnerabilities in Loxone Smart Home (part 2) (18.05.2015)
 documentsubmit_(at)_cxsec.org, phpMyAdmin 4.4.6 Man-In-the-Middle API Github (18.05.2015)
 documentSEC Consult Vulnerability Lab, SEC Consult SA-20150513-0 :: Multiple critical vulnerabilities in WSO2 Identity Server (18.05.2015)
 documentOnur Yilmaz, Concrete5 Security Advisory - Multiple XSS Vulnerabilities - CVE-2015-2250 (17.05.2015)
 documentVulnerability Lab, Web India Solutions CMS 2015 - SQL Injection Vulnerability (17.05.2015)
 documentapparitionsec_(at)_gmail.com, Sidu 5.2 Admin XSS Vulnerability (17.05.2015)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород