From jericho at attrition.org Thu Jun 1 05:37:35 2006 From: jericho at attrition.org (security curmudgeon) Date: Thu, 1 Jun 2006 05:37:35 -0400 (EDT) Subject: [VIM] Interlink "news_information.php" XSS (fwd) Message-ID: Found a site running this script with the same two variables. At the bottom, it links to the vendor as "Interlink Advantage": http://www.interlinkadvantage.com/ ---------- Forwarded message ---------- From: Mster-X at hotmail.com To: bugtraq at securityfocus.com Date: 20 May 2006 08:09:23 -0000 Subject: Interlink "news_information.php" XSS ========================== Discovery By: Mr-X Site: www.alshmokh.com E-mail: Mster-X at hotmail.com ========================== Example: /news_information.php?id=12&flag=[XSS] From jericho at attrition.org Thu Jun 1 05:40:44 2006 From: jericho at attrition.org (security curmudgeon) Date: Thu, 1 Jun 2006 05:40:44 -0400 (EDT) Subject: [VIM] RaceEventManagement <--v0.7.6 SQL injection & XSS (fwd) Message-ID: This is ISS 26580, but while searching google for "nennung.php" found two pages of results. The ISS entry, various bugtraq post references, and a couple sites using a page with that name. One of them is this site which is very suspicious given the subject of the post. I'm thinking this is site specific. http://www.race-event-management.de/rem/nennung.php?pid=1&id=153 ---------- Forwarded message ---------- From: Mster-X at hotmail.com To: bugtraq at securityfocus.com Date: 20 May 2006 10:20:40 -0000 Subject: RaceEventManagement <--v0.7.6 SQL injection & XSS ============================ Discovery By: Mr-X Site: www.alshmokh.com E-mail: Mster-X at hotmail.com =========================== Example: /nennung.php?pid=[SQL] /nennung.php?pid=[XSS] From coley at mitre.org Thu Jun 1 20:05:26 2006 From: coley at mitre.org (Steven M. Christey) Date: Thu, 1 Jun 2006 20:05:26 -0400 (EDT) Subject: [VIM] file include exploit in Support Cards v1 Message-ID: <200606020005.k5205QBh003733@cairo.mitre.org> FYI, emailed the following to black-cod3... ======================================================= Hello, Is this a product, or is this just a bug on a single web site? Thank you, Steve Christey CVE Editor From coley at linus.mitre.org Thu Jun 1 21:20:22 2006 From: coley at linus.mitre.org (Steven M. Christey) Date: Thu, 1 Jun 2006 21:20:22 -0400 (EDT) Subject: [VIM] my Web Server << v-1.0 Denial of Service Exploit (fwd) Message-ID: ---------- Forwarded message ---------- Date: Thu, 1 Jun 2006 19:20:12 -0400 (EDT) From: Steven M. Christey To: bugtraq at securityfocus.com Subject: Re: my Web Server << v-1.0 Denial of Service Exploit str0ke asked: >Is this the same vulnerability? >http://www.securityfocus.com/bid/5954 Well, let's see. Short answer is "probably not because they don't seem to be the same product." The most recent disclosure points to "MY Web Server" at http://eitsop.s5.com/, which links to source code in a ZIP file. Downloading the source code, we have a readme.txt that is dated June 22, 2002; the MyWS.exe also has this date. The deployment is very simple, with a handful of template files with minimal contents. summary: Author - eitsop Product - MY Web Server Version - 1.0 Date - June 22, 2002 Source Code - yes Now, the original disclosure as identified in BID 5954 points to a Bugtraq post (http://seclists.org/lists/bugtraq/2002/Oct/0177.html ; the securityfocus URL is broken) which points to http://www.mywebserver.org/ Note that there appears to be vendor acknowledgement of the issue in 1.0.3 in this changelog: http://www.mywebserver.org/us/downloads/whats_new_in_this_version.shtml which says "MyWebServers handles very long URL's and search strings making it invulnerable to DOS (Denial Of Service) Attacks by hackers." Still, the question remains - are these the same product or not? The author is different - Seth Snyder The product spelling is slightly different - MyWebServer (one word, instead of three) The current version is 1.0.3. A quick look suggests many more features than the Eitsop version. Looking at the history provided in the above URL, we have 2 dates for version 1.0 beta releases: 05/24/01 and 07/15/01 So, the release dates are also different. Finally, I ran "strings" on the two versions and compared results. The only shared strings were "My Web Server", "Request", "index.html", and a few other incidental matches. So - we have different authors, different spellings, different release dates, and entirely different strings. Looks different enough to me. But since they're web servers in early stages of development, it's not surprising that they join a couple dozen other web servers for having a buffer overflow using a long GET request - which is clearly "Vulnerability Assessment Assurance Level" 0, to remind people of David Litchfield's recent proposals on rating software security. - Steve From coley at mitre.org Fri Jun 2 20:19:48 2006 From: coley at mitre.org (Steven M. Christey) Date: Fri, 2 Jun 2006 20:19:48 -0400 (EDT) Subject: [VIM] zone-h.org links broken Message-ID: <200606030019.k530Jmn0028094@cairo.mitre.org> Looks like most/all of the zone-h.org vuln links are broken :-( e.g: http://www.zone-h.org/en/advisories/read/id=8480/ http://www.zone-h.org/advisories/read/id=8485 http://www.zone-h.org/en/advisories/read/id=8650/ Apparently this is part of a web redesign: http://www.zone-h.org/content/view/4467/30/ I couldn't figure out if the URLs were moved elsewhere. A search for some keywords failed (e.g. id 8650 above is SPIP, which returned 0 results). Given that their "ITSEC ADVISORIES" section is only 2 pages long, it's not clear where the old content is. I sent an e-mail (or at least filled out the contact form). - Steve From admin at zone-h.fr Fri Jun 2 21:39:08 2006 From: admin at zone-h.fr (Siegfried) Date: Sat, 3 Jun 2006 03:39:08 +0200 (CEST) Subject: [VIM] zone-h.org links broken In-Reply-To: <200606030019.k530Jmn0028094@cairo.mitre.org> References: <200606030019.k530Jmn0028094@cairo.mitre.org> Message-ID: <59408.217.201.80.34.1149298748.squirrel@webmail.zone-h.fr> Hi Steve, The content wasn't imported yet, it will soon be available, about the links; they may be working again after some days. Siegfried Le Sam 3 juin 2006 02:19, Steven M. Christey a ?crit : > > Looks like most/all of the zone-h.org vuln links are broken :-( > > > e.g: > > > http://www.zone-h.org/en/advisories/read/id=8480/ > http://www.zone-h.org/advisories/read/id=8485 > http://www.zone-h.org/en/advisories/read/id=8650/ > > > > Apparently this is part of a web redesign: > > > http://www.zone-h.org/content/view/4467/30/ > > > > I couldn't figure out if the URLs were moved elsewhere. A search for > some keywords failed (e.g. id 8650 above is SPIP, which returned 0 > results). > > Given that their "ITSEC ADVISORIES" section is only 2 pages long, it's > not clear where the old content is. I sent an e-mail (or at least filled > out the contact form). > > > - Steve > > From coley at linus.mitre.org Fri Jun 2 21:51:32 2006 From: coley at linus.mitre.org (Steven M. Christey) Date: Fri, 2 Jun 2006 21:51:32 -0400 (EDT) Subject: [VIM] zone-h.org links broken In-Reply-To: <59408.217.201.80.34.1149298748.squirrel@webmail.zone-h.fr> References: <200606030019.k530Jmn0028094@cairo.mitre.org> <59408.217.201.80.34.1149298748.squirrel@webmail.zone-h.fr> Message-ID: On Sat, 3 Jun 2006, Siegfried wrote: > The content wasn't imported yet, it will soon be available, about the > links; they may be working again after some days. OK, cool deal, thanks. I hate it when good links go bad :) - Steve From jericho at attrition.org Sat Jun 3 04:19:14 2006 From: jericho at attrition.org (security curmudgeon) Date: Sat, 3 Jun 2006 04:19:14 -0400 (EDT) Subject: [VIM] 25430: Jadu CMS register.php Multiple Variable XSS (fwd) Message-ID: After replying to this, Suraj agreed that posting to the list would be good. ---------- Forwarded message ---------- From: Suraj Kika To: security curmudgeon Date: Fri, 2 Jun 2006 15:21:47 +0100 Subject: Re: [OSVDB Mods] [Change Request] 25430: Jadu CMS register.php Multiple Variable XSS Hi Brian Thanks again for your personal attention here which is really appreciated. > Bear with me here please =) The more I understand the situation, the more > I can help out. First, this sounds like you are talking about a script > that was part of a hosted solution, not a downloaded/sold product. Is that > true? Yes indeed - thats true. To clarify - the 'register.php' is not part of our core Jadu CMS software. The CMS itself is purely a back end to any web front end. Many customers share scripts and code with each other. Many develop their own code - none of which is part of the software. 'register.php' is the generic name of a script that Jadu CMS requires in order to facilitate the user database area of the CMS. This is implemented by web designers/developers/clients. Its not part of the core Jadu CMS software. [..] > Second, I can help with that. There is a mail list where many of the > vulnerability databases talk and share this type of information. Once I > get the answer to the question above, I can send all of our dialogue to > the list so other VDBs can update as well. When I do, I will remove your > email address (to help prevent spam problems), but leave your name and > company name for reference. We do have a concern that posting again would cause another chain-reaction. At the moment, if you search Google for 'Jadu CMS' - you will see the damage :( Its been very hard for us as we are only small company. Do you think posting again would update the existing advisory posts or create new ones? If this means that our organic search results become diluted again with more security advisory results - im not sure we can take the hit again. Let me know what you think... Suraj On 2 Jun 2006, at 09:31, security curmudgeon wrote: > > Hey Suraj, > > : We had an issue where the input fields on a small number of web > : interfaces using a version of 'register.php' - a non-generic customised > : script - which were not correctly validated and hence allowed javascript > : to be entered. The Jadu CMS database itself is protected from cross site > : scripts and injection attacks. > : > : The issue was reported on Secunia and we found the affected sites and > : implemented a patch on their behalf. None of the underlying Jadu CMS > : systems were affected. > > Bear with me here please =) The more I understand the situation, the more > I can help out. First, this sounds like you are talking about a script > that was part of a hosted solution, not a downloaded/sold product. Is that > true? > > : Im trying to contact each advisory - and ask them to update their records. > > Second, I can help with that. There is a mail list where many of the > vulnerability databases talk and share this type of information. Once I > get the answer to the question above, I can send all of our dialogue to > the list so other VDBs can update as well. When I do, I will remove your > email address (to help prevent spam problems), but leave your name and > company name for reference. > > : It may be advisable to list the sites affected rather than the product? > > Each of the VDBs operate by product/vendor, not sites running them. If the > register.php script was part of a hosted solution, or something written > specific to a web site (even if re-used for a dozen sites), but not > something sold or offered to other people in any form, then it is > considered a site-specific issue and doesn't qualify for inclusion in most > VDBs. > > Brian > OSVDB.org > -- Suraj Kika CEO Jadu Limited, Development Centre: LCB, 31 Rutland Street, Leicester LE1 1RE Main office: PO Box 2554, Rugby, Warwickshire CV21 4ZE PLEASE NOTE THAT OUR CONTACT NUMBERS HAVE CHANGED: T: 0116 253 3423 F: 0116 253 3424 http://www.jadu.co.uk -- ISO 9001:2000 registered firm GB2001425 From jericho at attrition.org Mon Jun 5 00:55:13 2006 From: jericho at attrition.org (security curmudgeon) Date: Mon, 5 Jun 2006 00:55:13 -0400 (EDT) Subject: [VIM] RaceEventManagement <--v0.7.6 SQL injection & XSS (fwd) In-Reply-To: References: Message-ID: : This is ISS 26580, but while searching google for "nennung.php" found : two pages of results. The ISS entry, various bugtraq post references, : and a couple sites using a page with that name. One of them is this site : which is very suspicious given the subject of the post. I'm thinking : this is site specific. : : http://www.race-event-management.de/rem/nennung.php?pid=1&id=153 As Sullo points out to me: if you search inurl:nennung.php i see a bunch of race sites using it... so i think it's a product, someplace... From jericho at attrition.org Mon Jun 5 01:38:08 2006 From: jericho at attrition.org (security curmudgeon) Date: Mon, 5 Jun 2006 01:38:08 -0400 (EDT) Subject: [VIM] a question of credit Message-ID: We're seeing more and more of these types of disclosures lately, and I know several of us have talked about them and groan each time they happen. So, examine these two clips: #1 ---------- Forwarded message ---------- From: kubasx at gmail.com To: bugtraq at securityfocus.com Date: 30 May 2006 18:47:16 -0000 Subject: toendaCMS 0.7.0 Cross Site Scripting Discovery By: Jokubas.S =================================== Example: http://target/?id=[XSS] =================================== irc.data.lt #offence =================================== #2 http://secunia.com/advisories/20391/ Input passed to the "print_url" variable via _SERVER[QUERY_STRING] in engine/extensions/ext_footer/content_footer.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Successful exploitation requires that the user is running a browser that has not URL-encoded the request (e.g. Internet Explorer). -- Now, who really deserves credit here? Jokubas.S obviously pasted in some boring XSS code and saw a pop up window then posted to Bugtraq. But he didn't know or disclose this is apparently only valid in MSIE, that the flaw stems from a problem in content_footer.php, etc. From coley at mitre.org Mon Jun 5 11:53:13 2006 From: coley at mitre.org (Steven M. Christey) Date: Mon, 5 Jun 2006 11:53:13 -0400 (EDT) Subject: [VIM] phpESP ADODB fix is for old ADODB vuln Message-ID: <200606051553.k55FrDf5029665@cairo.mitre.org> FYI, from one of our CVE analysts here... Ref: CVE-2006-0806 - ADODB XSS At issue here was a very short changelog entry for phpESP 1.8.2 that says "FIXED ADODB SQL INJECT issue." http://sourceforge.net/project/shownotes.php?release_id=419843&group_id=8956 For us at CVE, the mention of ADODB isn't enough to prove that it's really addressing CVE-2006-0806. Obviously there's the different bug type, but in addition, there could be an error in how phpESP *uses* adodb (e.g. consider the recent MailManager "postgresql" hole). So... using this diff here: http://phpesp.cvs.sourceforge.net/phpesp/phpESP/admin/include/lib/adodb/adodb-pager.inc.php?r1=1.1&r2=1.2 The analyst was able to conclude: ACCURACY: The 1.8.2 changelog entry for Matthew Gregg and James Flemer php Easy Survey Package (phpESP) says "FIXED ADODB SQL INJECT issue." However, apparently the only ADODB-related source-code change in phpESP 1.8.2 is one that addresses the Cross Site Scripting issues in ADODB 4.71. Specifically, the code change matches what is described in the GulfTech advisory for curr_page and PHP_SELF. It is unclear why the changelog says "SQL INJECT" when Matthew Gregg wrote "fix for ADODB XSS vulnerability" in his CVS commit message. Probably he meant to write XSS in the changelog but inadvertently wrote SQL INJECT instead. From theall at tenablesecurity.com Mon Jun 5 15:58:44 2006 From: theall at tenablesecurity.com (George A. Theall) Date: Mon, 05 Jun 2006 15:58:44 -0400 Subject: [VIM] # MHG Security Team ---Rumble 1.02 version Remote File Inc. Message-ID: <44848CF4.1090207@tenablesecurity.com> FWIW, MHG Security Team recently published an advisory on Bugtraq about a product named "Rumble", but they failed to provide a link to the vendor or mention anything else about it. Well, in case anyone's interested, the product seems to be this: http://dev.lophty.com/rumble/ which is also available here: http://www.getfreesofts.com/script/869/157/RUMBLE.html And maybe I've just been staring at things too much today, but I fail to see how this is a flaw as it is currently written - the script initializes the array at the start and only sets variables, never calling another PHP script. George -- theall at tenablesecurity.com From coley at mitre.org Mon Jun 5 16:49:21 2006 From: coley at mitre.org (Steven M. Christey) Date: Mon, 5 Jun 2006 16:49:21 -0400 (EDT) Subject: [VIM] product name: PHPcafe.net Tutorials Manager Message-ID: <200606052049.k55KnL3k005110@cairo.mitre.org> some people are spelling it "Tutorial Manager" but a glance at the home page reveals the correct spelling... http://www.phpcafe.net/index.php/pg/tmain - Steve From jericho at attrition.org Mon Jun 5 17:03:58 2006 From: jericho at attrition.org (security curmudgeon) Date: Mon, 5 Jun 2006 17:03:58 -0400 (EDT) Subject: [VIM] CS-Cart issue maybe PHPMailer? Message-ID: http://milw0rm.com/exploits/1872 The example url: /[CS-Cart_path]/classes/phpmailer/class.cs_phpmailer.php?classes_dir=[evil_scripts] Looking at the PHPMailer package (http://phpmailer.sourceforge.net/), we see it has "class.phpmailer.php" in it. It is likely CS-Cart utilizes the free PHPMailer package and the vulnerability lies in it. I am contacting Brent Matzelle to ask. From coley at mitre.org Mon Jun 5 17:47:34 2006 From: coley at mitre.org (Steven M. Christey) Date: Mon, 5 Jun 2006 17:47:34 -0400 (EDT) Subject: [VIM] WeBWorK Online template issue - more details Message-ID: <200606052147.k55LlY3t006048@cairo.mitre.org> Refs: http://sourceforge.net/project/shownotes.php?release_id=421453 FRSIRT:ADV-2006-2086 SECUNIA:20405 I glanced through a mailing list and saw this: http://sourceforge.net/mailarchive/forum.php?thread_id=10201693&forum_id=43257 So, looks like a couple avenues for directory traversal in PGProblemEditor.pm. - Steve From coley at linus.mitre.org Mon Jun 5 18:28:37 2006 From: coley at linus.mitre.org (Steven M. Christey) Date: Mon, 5 Jun 2006 18:28:37 -0400 (EDT) Subject: [VIM] # MHG Security Team ---Rumble 1.02 version Remote File Inc. In-Reply-To: <44848CF4.1090207@tenablesecurity.com> References: <44848CF4.1090207@tenablesecurity.com> Message-ID: On Mon, 5 Jun 2006, George A. Theall wrote: > And maybe I've just been staring at things too much today, but I fail to > see how this is a flaw as it is currently written - the script > initializes the array at the start and only sets variables, never > calling another PHP script. I don't see anything relevant either... from config.php (in 1.02): $configArr = array(); //-------------------------------------------------------------------- // 'pathtodir' = the absolute path to directory containing your "rumble" install //-------------------------------------------------------------------- $configArr['pathtodir'] = "http://dev.monokromatik.com/rumble/"; Nothing else is provided. Maybe it was a custom site that was tested? - Steve From coley at mitre.org Mon Jun 5 21:02:14 2006 From: coley at mitre.org (Steven M. Christey) Date: Mon, 5 Jun 2006 21:02:14 -0400 (EDT) Subject: [VIM] ashnews issue seems to be old rediscovery Message-ID: <200606060102.k5612ENY009298@cairo.mitre.org> Ref: http://www.milw0rm.com/exploits/1864 same affected version and exploit vectors as CVE-2003-1292, and apparently there was a rediscovery in January, which George seems to know about :) - Steve ====================================================== Name: CVE-2003-1292 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1292 Acknowledged: yes followup Announced: 20030720 Flaw: php-include Reference: BUGTRAQ:20030720 sorry, wrong file Reference: URL:http://www.securityfocus.com/archive/1/329910 Reference: FULLDISC:20060130 Re: ashnews Cross-Site Scripting Vulnerability Reference: URL:http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0969.html Reference: FULLDISC:20060131 Re: ashnews Cross-Site Scripting Vulnerability Reference: URL:http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0979.html Reference: FULLDISC:20060131 Re: ashnews Cross-Site Scripting Vulnerability Reference: URL:http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0980.html Reference: CONFIRM:http://forums.ashwebstudio.com/viewtopic.php?t=353&start=0 Reference: BID:16436 Reference: URL:http://www.securityfocus.com/bid/16436 Reference: SECUNIA:9331 Reference: URL:http://secunia.com/advisories/9331 PHP remote file include vulnerability in Derek Ashauer ashNews 0.83 allows remote attackers to include and execute arbitrary remote files via a URL in the pathtoashnews parameter to (1) ashnews.php and (2) ashheadlines.php. Analysis: ACKNOWLEDGEMENT: The vendor's forum post says 'There is a security vulnerability in ashnews. ... On line 22 (or somewhere close to it) ... include($pathtoashnews."ashprojects/newsconfig.php"); ... Should be ... include("ashprojects/newsconfig.php");.' The forum post is written as a followup to related information on a security-corporation.com web page (which seems to no longer exist). From coley at linus.mitre.org Mon Jun 5 23:42:25 2006 From: coley at linus.mitre.org (Steven M. Christey) Date: Mon, 5 Jun 2006 23:42:25 -0400 (EDT) Subject: [VIM] CS-Cart issue maybe PHPMailer? In-Reply-To: References: Message-ID: might not be PHPmailer. Just downloaded phpmailer from that URL and grepped for classes_dir - no go. So this might be an interface/integration issue (speaking of which, is anybody else sick of integration issues yet? I have a feeling it's gonna get worse). Anyway, since you emailed the PHPMailer people I figured I'd send an inquiry to the CS-Cart people at http://www.cs-cart.com/contact.php . Stay tuned. - Steve On Mon, 5 Jun 2006, security curmudgeon wrote: > > http://milw0rm.com/exploits/1872 > > The example url: > /[CS-Cart_path]/classes/phpmailer/class.cs_phpmailer.php?classes_dir=[evil_scripts] > > > Looking at the PHPMailer package (http://phpmailer.sourceforge.net/), we > see it has "class.phpmailer.php" in it. It is likely CS-Cart utilizes the > free PHPMailer package and the vulnerability lies in it. I am contacting > Brent Matzelle to ask. > From coley at mitre.org Tue Jun 6 00:12:37 2006 From: coley at mitre.org (Steven M. Christey) Date: Tue, 6 Jun 2006 00:12:37 -0400 (EDT) Subject: [VIM] It's the defacers, stupid Message-ID: <200606060412.k564Cb77012424@cairo.mitre.org> Sitting and staring at the 598'th post with minimal details and obvious inconsistencies, it suddenly became clear... It's the defacers, stupid! There are lots of cut-and-paste researchers out there, sure... but it's clear from the signatures and commentary of various mailing list posters, that some of the more frequent posters are in the business of defacing, which is entirely attack focused. So there isn't a need or desire to figure out the underlying product relationships, environmental restrictions, etc. Am I slow? Did everyone else know this and not bother to mention it? Agree or disagree? (it's a theory, anyway) - Steve From jericho at attrition.org Tue Jun 6 00:28:18 2006 From: jericho at attrition.org (security curmudgeon) Date: Tue, 6 Jun 2006 00:28:18 -0400 (EDT) Subject: [VIM] It's the defacers, stupid In-Reply-To: <200606060412.k564Cb77012424@cairo.mitre.org> References: <200606060412.k564Cb77012424@cairo.mitre.org> Message-ID: : Sitting and staring at the 598'th post with minimal details and obvious : inconsistencies, it suddenly became clear... It's the defacers, stupid! : There are lots of cut-and-paste researchers out there, sure... but it's : clear from the signatures and commentary of various mailing list : posters, that some of the more frequent posters are in the business of : defacing, which is entirely attack focused. So there isn't a need or : desire to figure out the underlying product relationships, environmental : restrictions, etc. : : Am I slow? Did everyone else know this and not bother to mention it? : Agree or disagree? Two years ago, I would have been all over that theory =) This should be easy to determine by watching the zone-h defacement archives for a few days or weeks. This assumes that they are defacing under one name and not switching for disclosing vulns. I can say that historically, back when the attrition mirror was running, this was not the case. Most defacers used precanned scripts that allowed for remote code execution. It was rare to see any defacer post to the regular disclosure type lists. Even now, I have doubts. Most of these crappy disclosures are cross-site scripting, and some SQL injection. I seriously doubt they are using XSS to do defacing. While SQL has the power to do that (even if it means dumping admin password, logging in and editing), most of these SQL injection discovering scream ' paste testing, look for error, cry out SQL injection. I have serious doubts about many of them being able to craft the query needed to exploit it for that type of privilege escalation. From coley at linus.mitre.org Tue Jun 6 01:44:35 2006 From: coley at linus.mitre.org (Steven M. Christey) Date: Tue, 6 Jun 2006 01:44:35 -0400 (EDT) Subject: [VIM] CS-Cart: request for information (fwd) Message-ID: FYI - received approval to forward. ---------- Forwarded message ---------- Date: Tue, 6 Jun 2006 09:21:48 +0400 From: CS-Cart.com Sales department To: coley at mitre.org Subject: Re: CS-Cart: request for information Dear Steve, My name is Vladimir Kalynyak, I'm a Senior Sales Executive at CS-Cart.com. Thank you for contacting us regarding the issue with CS-Cart vulnerability. Yes, the information at http://milw0rm.com/exploits/1872 actually describes the vulnerability CS-Cart software contained. By this moment this issue has been fixed for all affected versions(1.3.0-1.3.3) and all CS-Cart users have been provided with a Security Update and instructions on how to eleminate the vulnerability. -- Thank you Vladimir Kalynyak Senior Sales Executive, CS-Cart.com http://www.cs-cart.com/ From coley at linus.mitre.org Tue Jun 6 02:51:25 2006 From: coley at linus.mitre.org (Steven M. Christey) Date: Tue, 6 Jun 2006 02:51:25 -0400 (EDT) Subject: [VIM] It's the defacers, stupid In-Reply-To: References: <200606060412.k564Cb77012424@cairo.mitre.org> Message-ID: On Tue, 6 Jun 2006, security curmudgeon wrote: > I can say that historically, back when the attrition mirror was running, > this was not the case. Most defacers used precanned scripts that allowed > for remote code execution. It was rare to see any defacer post to the > regular disclosure type lists. You don't need precanned scripts any more, though - as you point out, a couple ' and