Информационная безопасность
[RU] switch to English


Ежедневная сводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
дополнено с 12 мая 2009 г.
Опубликовано:13 мая 2009 г.
Источник:
SecurityVulns ID:9904
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:SQUIRRELMAIL : squirrelmail 1.4
 BIGACE : Bigace CMS 2.5
 FORMMAIL : FormMail 1.92
 BITWEAVER : Bitweaver 2.6
 AJAXTERM : AjaxTerm 0.10
 AAS : Application Access Server 2.0
 MAXCMS : maxcms 2.0
 FAMILYCONNECTION : Family Connections 1.9
CVE:CVE-2009-1581 (functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message.)
 CVE-2009-1580 (Session fixation vulnerability in SquirrelMail before 1.4.18 allows remote attackers to hijack web sessions via a crafted cookie.)
 CVE-2009-1579 (The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.)
 CVE-2009-1578 (Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING).)
 CVE-2009-1466 (Application Access Server (A-A-S) 2.0.48 stores (1) passwords and (2) the port keyword in cleartext in aas.ini, which allows local users to obtain sensitive information by reading this file.)
 CVE-2009-1465 (Application Access Server (A-A-S) 2.0.48 has "wildbat" as its default password for the admin account, which makes it easier for remote attackers to obtain access.)
 CVE-2009-1464 (Multiple cross-site request forgery (CSRF) vulnerabilities in index.aas in Application Access Server (A-A-S) 2.0.48 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary programs via a command job, (2) stop services via a setservice job, or (3) terminate processes via a killprocess job.)
Оригинальный текстdocumentMANDRIVA, [ MDVSA-2009:110 ] squirrelmail (13.05.2009)
 documenty3nh4ck3r_(at)_gmail.com, (GET var 'member') BLIND SQL INJECTION EXPLOIT --FAMILY CONNECTIONS <= v1.9 --> (13.05.2009)
 documentinfo_(at)_securitylab.ir, maxcms2.0 creat new admin exploit (13.05.2009)
 documentFelipe M. Aragon, Syhunt: A-A-S (Application Access Server) Multiple Security Vulnerabilities (13.05.2009)
 documentAndrea Barisani, [oCERT-2009-004] AjaxTerm session id collision (12.05.2009)
 documenty3nh4ck3r_(at)_gmail.com, (POST var 'rating') BLIND SQL INJECTION--microTopic v1 Initial Release--> (12.05.2009)
 documentrgod, Bitweaver <= 2.6 /boards/boards_rss.php / saveFeed() remote code execution exploit (12.05.2009)
 documentascii, FormMail 1.92 Multiple Vulnerabilities (12.05.2009)
 documenty3nh4ck3r_(at)_gmail.com, User options changer (SQLi) EXPLOIT --Bigace CMS -stable release- 2.5--> (12.05.2009)
Файлы:User options changer (SQLi) EXPLOIT --Bigace CMS -stable release- 2.5
 Bitweaver <= 2.6 /boards/boards_rss.php / saveFeed() remote code execution exploit
 (POST var 'rating') BLIND SQL INJECTION--microTopic v1 Initial Release
 maxcms2.0 create new admin exploit
 (GET var 'member') BLIND SQL INJECTION EXPLOIT --FAMILY CONNECTIONS <= v1.9

Проблема шелл-символов в Sun Identity Manager
Опубликовано:13 мая 2009 г.
Источник:
SecurityVulns ID:9905
Тип:удаленная
Уровень опасности:
6/10
Описание:Проблемы шел-смиволов при обработке пароля.
Затронутые продукты:SUN : Sun Identity Manager 7.1
 SUN : Sun Identity Manager 8.0
Оригинальный текстdocument[email protected], Sun IDM Arbitrary Commands Execution Vulnerability (13.05.2009)

Обратный путь в каталогах Pinnacle Studio
Опубликовано:13 мая 2009 г.
Источник:
SecurityVulns ID:9906
Тип:клиент
Уровень опасности:
5/10
Описание:Обратный путь в каталогах при распаковке файлов .hlz (Hollywood FX Compressed Archive).
Затронутые продукты:PINNACLE : Pinnacle Studio 12
Оригинальный текстdocumentipsdix_(at)_gmail.com, Pinnacle Studio 12 "Hollywood FX Compressed Archive" (.hfz) directory traversal vulnerability poc (13.05.2009)
Файлы:Pinnacle Studio 12 "Hollywood FX Compressed Archive" (.hfz) PoC

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород