Subscribe via feed.
Archive for May, 2016

AVAST (Business) #17 – Persistent Web Vulnerability

Posted by deepcore under exploit (No Respond)

An independent vulnerability laboratory researcher discovered an application-side input validation web vulnerability in the official Avast Business and Shop online service web-application.

Bashi v1.6 iOS – Persistent Mail Encoding Vulnerability

Posted by deepcore under exploit (No Respond)

The vulnerability laboratory core research team discovered an application-side mail encoding web vulnerability in the official Bashi v1.6 iOS mobile application.

AVAST (Shop) #18 – Multiple Client Side XSS Vulnerabilities

Posted by deepcore under exploit (No Respond)

An independent vulnerability laboratory researcher discovered multiple client-side web vulnerabilities in the official Avast Shop online service web-application.

Counterfeiting With Cisco IP Communicator

Posted by deepcore under exploit (No Respond)

Whitepaper that discusses how Cisco IP Communicator only uses MAC addresses for authentication allowing you to spoof other callers.

Infobae Cross Site Scripting

Posted by deepcore under exploit (No Respond)

The Infobae website suffers from multiple cross site scripting vulnerabilities. The author has received no response from them.

MediaLink MWN-WAPR300N Insecure Session

Posted by deepcore under exploit (No Respond)

MediaLink router MWN-WAPR300N suffers from multiple session related issues such as not being able to logout and sessions do not time out. Insecure transport is another issue.

XenAPI For XenForo 1.4.1 SQL Injection

Posted by deepcore under exploit (No Respond)

XenAPI for XenForo version 1.4.1 suffers from a remote SQL injection vulnerability.

AfterLogic WebMail Pro ASP.NET Account Takeover / XXE Injection

Posted by deepcore under exploit (No Respond)

AfterLogic WebMail Pro ASP.NET versions prior to 6.2.7 suffer from an administrator account takeover via an XXE injection vulnerability.

PowerFolder 10.4.321 Remote Code Execution

Posted by deepcore under exploit (No Respond)

PowerFolder version 10.4.321 suffers from a remote code execution vulnerability. Proof of concept exploit included.

Ubiquiti airOS Arbitrary File Upload

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a pre-auth file upload to install a new root user to /etc/passwd and an SSH key to /etc/dropbear/authorized_keys. FYI, /etc/{passwd,dropbear/authorized_keys} will be overwritten. /etc/persistent/rc.poststart will be overwritten if PERSIST_ETC is true. This method is used by the “mf” malware infecting these devices.