Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

MySQL Multibyte Encoding SQL Injection Vulnerability More about Read More...

Posted on Friday, June 02, 2006 @ 12:21:24 CDT in Security
by Raven

TITLE: MySQL Multibyte Encoding SQL Injection Vulnerability

SECUNIA ADVISORY ID: SA20365

VERIFY ADVISORY: http://secunia.com/advisories/20365/

CRITICAL: Moderately critical

IMPACT: Manipulation of data

WHERE: >From remote

SOFTWARE:
MySQL 5.x
http://secunia.com/product/8355/
MySQL 4.x
http://secunia.com/product/404/

DESCRIPTION: A vulnerability has been reported in MySQL, which potentially can be exploited by malicious people to conduct SQL injection attacks. The vulnerability is caused due to an error within the server when parsing a query string that is escaped with the "mysql_real_escape_string()" function. This can potentially be exploited in an environment that uses multi-byte character encoding to bypass SQL injection escaping. The vulnerability is related to: SA20231. The vulnerability has been reported in version 4.1.19 and 5.0.21. Prior versions may also be affected.

SOLUTION: Update to the fixed versions.

MySQL 4.1.x: Update to version 4.1.20.
http://dev.mysql.com/downloads/mysql/4.1.html

MySQL 5.0.x: Update to version 5.0.22.
http://dev.mysql.com/downloads/mysql/5.0.html

MySQL 5.1.x: The vulnerability will be fixed in version 5.1.11.
 Read More...
 

 

Firefox Multiple Vulnerabilities - Highly Critical! More about Read More...

Posted on Friday, June 02, 2006 @ 09:13:49 CDT in Security
by Raven

TITLE: Firefox Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA20376

VERIFY ADVISORY: http://secunia.com/advisories/20376/

CRITICAL: Highly critical

IMPACT: Security Bypass, Cross Site Scripting, System access

WHERE: >From remote

SOFTWARE:
Mozilla Firefox 1.x
http://secunia.com/product/4227/
Mozilla Firefox 0.x
http://secunia.com/product/3256/

DESCRIPTION: Multiple vulnerabilities have been reported in Firefox, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system.

1) An error in the sandbox protection of JavaScript run via EvalInSandbox can be exploited to execute arbitrary JavaScript code with escalated privileges by calling the "valueOf()" function on external objects outside of the sandbox. Successful exploitation requires that the attacker is able to execute JavaScript code inside the EvalInSandbox (e.g. via a Proxy Autoconfig script or a third-party extension using the vulnerable functionality).

2) Some errors in the browser engine can be exploited to cause a memory corruption. Successful exploitation may allow execution of arbitrary code.

3) Two errors in the handling of specially crafted HTTP responses in certain situations can be exploited to cause the browser to process a response as two separate responses from different sites. Successful exploitation allows execution of arbitrary HTML and script in a user's browser session in context of an arbitrary site, but requires that the browser is configured to use a proxy or that the malicious site shares the same IP address as the targeted site.

4) Two errors in the handling of the "View Image" and "Show only this frame" functionalities can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an arbitrary site by e.g. tricking a user into right-clicking and choosing "View Image" on a broken image.

5) An error caused due to persisted XUL attributes in certain situations being associated with an incorrect URL can be exploited to execute arbitrary JavaScript code with escalated privileges.

6) An error caused due to content-defined setters on an object prototype being called by privileged code in the user interface can be exploited to execute arbitrary JavaScript code with escalated privileges.

7) An error caused due to an off-by-two array boundary error in the "crypto.signText()" function can be exploited to cause a buffer overflow by passing optional Certificate Authority name arguments.

8) An error exists due to Unicode Byte-order-Mark (BOM) data being stripped from documents served in UTF-8 during the conversion to Unicode. This can be exploited to bypass certain HTML and JavaScript filtering mechanisms in web applications using the UTF-8 character encoding.

9) An error in the processing of the addSelectionListener when handling notifications in certain situations can be exploited to execute arbitrary JavaScript code with escalated privileges.

SOLUTION: Update to version 1.5.0.4.
http://www.mozilla.com/firefox/
 Read More...
 

 

Thunderbird Multiple Vulnerabilities - Highly Critical More about Read More...

Posted on Friday, June 02, 2006 @ 09:03:58 CDT in Security
by Raven

TITLE: Thunderbird Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA20382

VERIFY ADVISORY: http://secunia.com/advisories/20382/

CRITICAL: Highly critical

IMPACT: Security Bypass, Cross Site Scripting, System access

WHERE: >From remote

SOFTWARE:
Mozilla Thunderbird 0.x
http://secunia.com/product/2637/
Mozilla Thunderbird 1.0.x
http://secunia.com/product/9735/
Mozilla Thunderbird 1.5.x
http://secunia.com/product/4652/

DESCRIPTION: Multiple vulnerabilities have been reported in Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system. For more information, see vulnerabilities #1, #2, #3, #5, #6, #7, and #9 in: SA20376. Successful exploitation of some of the vulnerabilities requires that JavaScript is enabled (not enabled by default).

The following vulnerability has also been reported: The vulnerability is caused due to a double-free error within the processing of large VCards with invalid base64 characters. This may be exploited to execute arbitrary code.

SOLUTION: Update to version 1.5.0.4.
http://www.mozilla.com/thunderbird/
 Read More...
 

 

phpBB Blend Portal System Module More about

Posted on Wednesday, May 31, 2006 @ 07:27:52 CDT in Security
by Raven

TITLE: phpBB Blend Portal System Module "phpbb_root_path" File Inclusion

SECUNIA ADVISORY ID: SA20350

VERIFY ADVISORY: http://secunia.com/advisories/20350/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: Blend Portal System 1.x (module for phpBB)
http://secunia.com/product/10215/

DESCRIPTION: Mustafa Can Bjorn has reported a vulnerability in the Blend Portal System module for phpBB, which can be exploited by malicious people to compromise a vulnerable system.

Input passed to the "phpbb_root_path" parameter in blend_data/blend_common.php isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from external and local resources.

Successful exploitation requires that "register_globals" is enabled.

The vulnerability has been reported in version 1.2.0. Other versions may also be affected.

SOLUTION: Apply code changes as instructed by the vendor. http://phpbb-tweaks.com/topics.html-p-17623#17623

PROVIDED AND/OR DISCOVERED BY: Mustafa Can Bjorn

ORIGINAL ADVISORY: http://www.nukedx.com/?viewdoc=41
 

 

phpBB Activity Mod Plus Module phpbb_root_path File Inclusion More about

Posted on Wednesday, May 31, 2006 @ 07:24:11 CDT in Security
by Raven

TITLE: phpBB Activity Mod Plus Module "phpbb_root_path" File Inclusion

SECUNIA ADVISORY ID: SA20354

VERIFY ADVISORY: http://secunia.com/advisories/20354/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: Activity Mod Plus 1.x (module for phpBB)
http://secunia.com/product/10213/

DESCRIPTION: Mustafa Can Bjorn has reported a vulnerability in the Activity Mod Plus module for phpBB, which can be exploited by malicious people to compromise a vulnerable system.

Input passed to the "phpbb_root_path" parameter in "language/lang_english/lang_activity.php" isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from external and local resources.

The "lang_activity_char.php" script is reportedly also affected.

Successful exploitation requires that "register_globals" is enabled.

SOLUTION: Apply code changes as instructed by the vendor. http://www.phpbb-amod.com/topics.html-t-2423

PROVIDED AND/OR DISCOVERED BY: Mustafa Can Bjorn

ORIGINAL ADVISORY: http://www.nukedx.com/?viewdoc=38
 

 

PHP curl_init() Safe Mode Bypass Weakness More about

Posted on Wednesday, May 31, 2006 @ 07:17:38 CDT in Security
by Raven

TITLE: PHP "curl_init()" Safe Mode Bypass Weakness

SECUNIA ADVISORY ID: SA20337

VERIFY ADVISORY: http://secunia.com/advisories/20337/

CRITICAL: Not critical

IMPACT: Security Bypass

WHERE: Local system

SOFTWARE:
PHP 5.1.x
http://secunia.com/product/6796/
PHP 4.4.x
http://secunia.com/product/5768/
PHP 5.0.x
http://secunia.com/product/3919/

DESCRIPTION: Maksymilian Arciemowicz has discovered a weakness in PHP, which can be exploited by malicious, local users to bypass certain security restrictions.

The weakness is caused due to an error in the handling of null byte characters in the "curl_init()" PHP function in the curl extension. This can be exploited to bypass the safe mode protection and access other users' files located in the same directory as the running script.

Successful exploitation requires that the curl extension is installed and enabled.

The weakness has been confirmed in versions 5.0.5 and 5.1.4, and has also been reported in version 4.4.2. Other versions may also be affected.

SOLUTION: The weakness has been fixed in the CVS repository.

Do not rely on the safe mode protection for files located in the same directory as untrusted scripts.

PROVIDED AND/OR DISCOVERED BY: Maksymilian Arciemowicz

ORIGINAL ADVISORY: http://securityreason.com/achievement_securityalert/39
 



Page 80 of 102 (608 total stories) [ << | < | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,926,880
  • Today: 46,316
Server InfoServer Info
  • Apr 29, 2025
  • 11:33 am CDT