Subscribe via feed.
Archive for November, 2021

Pentaho Business Analytics / Pentaho Business Server 9.1 Insufficient Access Control

Posted by deepcore under exploit (No Respond)

Pentaho implements a series of web services using the SOAP protocol to allow scripting interaction with the backend server. While most of the interfaces correctly implement ACL, the Data Source Management Service located at /pentaho/webservices/datasourceMgmtService allows low-privilege authenticated users to list the connection details of all data sources used by Pentaho.

ImportExportTools NG 10.0.4 HTML Injection

Posted by deepcore under exploit (No Respond)

ImportExportTools NG version 10.0.4 suffers from an html injection vulnerability.

Backdoor.Win32.Ncx.b Code Execution

Posted by deepcore under exploit (No Respond)

Backdoor.Win32.Ncx.b malware suffers from a code execution vulnerability.

IBM Sterling B2B Integrator Cross Site Scripting

Posted by deepcore under exploit (No Respond)

IBM Sterling B2B Integrator suffers from a cross site scripting vulnerability. Versions affected include 5.2.0.0 through 5.2.6.5_3, 6.0.0.0 through 6.0.3.4, and 6.1.0.0 through 6.1.0.2.

PHP Event Calendar Lite Edition Cross Site Scripting

Posted by deepcore under exploit (No Respond)

PHP Event Calendar Lite Edition suffers from a persistent cross site scripting vulnerability.

Pentaho Business Analytics / Pentaho Business Server 9.1 Authentication Bypass

Posted by deepcore under exploit (No Respond)

Pentaho Business Analytics and Pentaho Business Server versions 9.1 and below suffer from an authentication bypass vulnerability related to Spring APIs.

Backdoor.Win32.Jokerdoor Buffer Overflow

Posted by deepcore under exploit (No Respond)

Backdoor.Win32.Jokerdoor malware suffers from a buffer overflow vulnerability.

Pentaho Business Analytics / Pentaho Business Server 9.1 User Enumeration

Posted by deepcore under exploit (No Respond)

Pentaho implements a series of web services using the SOAP protocol to allow scripting interaction with the backend server. HAWSEC identified that the services userRoleListService and ServiceAction exposed through the /pentaho/webservices/userRoleListService and /pentaho/ServiceAction?action=SecurityDetails endpoints are not enforcing sufficient access controls. Specifically, an authenticated user can list all application usernames present in the Jackrabbit Repository.

HealthForYou 1.11.1 / HealthCoach 2.9.2 Missing Password Policy

Posted by deepcore under exploit (No Respond)

HealthForYou version 1.11.1 and HealthCoach version 2.9.2 are missing a server-side password policy. When creating an account or changing your password the mobile and web application both check the password against the password policy. But the API assumes that the given password is already checked therefore an attacker can intercept the HTTP request and change […]

Pentaho Business Analytics / Pentaho Business Server 9.1 SQL Injection

Posted by deepcore under exploit (No Respond)

Pentaho allows users to create and manage Data Sources. Users can select a Data Source when creating a Dashboard through the Pentaho User Console. When a Data Source is added, Pentaho makes a HTTP request to the dashboards editor (/pentaho/api/repos/dashboards/editor) in order to test the connection by executing a test SQL query. However, further examination […]