[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] Multiple vulnerabilities in SimpGB



<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
    <title></title>
  </head>
  <body bgcolor="#ffffff" text="#000000">
    ahaah.<br>
    Nice reply Sparky.<br>
    MustLive, seems you've been defaced :-)<br>
    <br>
    antisnatchor<br>
    <br>
    <blockquote style="border: 0px none;"
      cite="mid:AANLkTimeMY135vdnnpYMUMHYmohqtsztMtnKDgzyQmSf@xxxxxxxxxxxxxx"
      type="cite">
      <div style="margin-left: 40px;">
        <hr style="border-width: 1px 0pt 0pt; border-style: dotted none
          none; border-color: rgb(181, 181, 181) -moz-use-text-color
          -moz-use-text-color; height: 1px; margin: 0pt;"
          class="__pbConvHr"><br>
      </div>
      <table style="padding-top: 5px;" class="__pbConvTable">
        <tbody>
          <tr>
            <td valign="top"><img
                src="cid:part1.08010202.04070904@gmail.com"
                photoaddress="laurent.gaffie@xxxxxxxxx"
                photoname="laurent gaffie"
                name="compose-unknown-contact.jpg" height="29px"
                width="29px"></td>
            <td style="padding-left: 5px;" valign="top"><a
                moz-do-not-send="true"
                href="mailto:laurent.gaffie@xxxxxxxxx"; style="color:
                rgb(0, 136, 204) ! important; text-decoration: none !
                important;">laurent gaffie</a><br>
              <font color="#888888">February 5, 2011 3:36 AM</font></td>
          </tr>
        </tbody>
      </table>
      <div style="color: rgb(136, 136, 136); margin-left: 40px;"
        __pbrmquotes="true" class="__pbConvBody"><br>
        Hey Sparky, <br>
        <br>
        One of the many many thing you didn't understand during the past
        5 years is that you should probably try to identify and fix your
        stuff on *your* website, before spamming this ML with your crap.
        <br>
        cf:<br>
        <a moz-do-not-send="true" target="_blank"
          
href="http://www.zone-h.org/mirror/id/11367858";>http://www.zone-h.org/mirror/id/11367858</a><br>
        <br>
        e-tard.<br>
        <br>
        <br>
        <div>_______________________________________________<br>
          Full-Disclosure - We believe in it.<br>
          Charter: <a class="moz-txt-link-freetext" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
          Hosted and sponsored by Secunia - <a class="moz-txt-link-freetext" 
href="http://secunia.com/";>http://secunia.com/</a></div>
        <hr style="border-width: 1px 0pt 0pt; border-style: dotted none
          none; border-color: rgb(181, 181, 181) -moz-use-text-color
          -moz-use-text-color; height: 1px; margin: 15px 0pt 0pt;"
          class="__pbConvHr"><br>
      </div>
      <table style="padding-top: 5px;" class="__pbConvTable">
        <tbody>
          <tr>
            <td valign="top"><img
                src="cid:part1.08010202.04070904@gmail.com"
                photoaddress="mustlive@xxxxxxxxxxxxxxxxxx"
                photoname="MustLive" name="compose-unknown-contact.jpg"
                height="29px" width="29px"></td>
            <td style="padding-left: 5px;" valign="top"><a
                moz-do-not-send="true"
                href="mailto:mustlive@xxxxxxxxxxxxxxxxxx"; style="color:
                rgb(0, 136, 204) ! important; text-decoration: none !
                important;">MustLive</a><br>
              <font color="#888888">February 4, 2011 10:49 PM</font></td>
          </tr>
        </tbody>
      </table>
      <div style="color: rgb(136, 136, 136); margin-left: 40px;"
        __pbrmquotes="true" class="__pbConvBody"><br>
        <div>Hello Laurent!<br>
          <br>
          You are very "intelligent" man, as I see from this and
          previous your letter<br>
          (in 2010).<br>
          <br>
          You need to take into account the next:<br>
          <br>
          1. I know better where to send.<br>
          <br>
          2. If you write shitty stuff, then it doesn't mean that other
          do the same.<br>
          <br>
          3. No need to think and state instead of other people - if
          it's not<br>
          interesting for you, then it can be interesting for others.<br>
          <br>
          4. The main and obvious thing it's that I write all my
          advisories from 2006<br>
          for those people who are interested in them (and there are
          such people, as I<br>
          know for sure). So if you or anybody else is not interested in
          them, just<br>
          skip them (and don't need to write me nonsenses) - I'm writing
          my letters<br>
          not for you, but for others who is interested in them and who
          thanks me for<br>
          my work. It's strange that such "intelligent" man as you
          didn't understand<br>
          it for last five years :-).<br>
          <br>
          5. I don't need any not serious letters from you, so don't
          waste your time<br>
          writing me anymore, because I've put your e-mail into
          blacklist. Spend your<br>
          time for good things.<br>
          <br>
          Best wishes &amp; regards,<br>
          MustLive<br>
          Administrator of Websecurity web site<br>
          <a class="moz-txt-link-freetext" 
href="http://websecurity.com.ua";>http://websecurity.com.ua</a><br>
          <br>
          ----- Original Message ----- <br>
          From: laurent gaffie<br>
          To: MustLive<br>
          Cc: <a class="moz-txt-link-abbreviated" 
href="mailto:full-disclosure@xxxxxxxxxxxxxxxxx";>full-disclosure@xxxxxxxxxxxxxxxxx</a>
 ;
          <a class="moz-txt-link-abbreviated" 
href="mailto:bugtraq@xxxxxxxxxxxxxxxxx";>bugtraq@xxxxxxxxxxxxxxxxx</a><br>
          Sent: Wednesday, January 26, 2011 5:09 PM<br>
          Subject: Re: [Full-disclosure] Multiple vulnerabilities in
          SimpGB<br>
          <br>
          <br>
          Send your shitty stuff to <a class="moz-txt-link-abbreviated" 
href="mailto:bugtraq@xxxxxxxxxxxxxxxxx";>bugtraq@xxxxxxxxxxxxxxxxx</a><br>
          <br>
          If it's not obvious, no one give a shit here, seriously.<br>
          <br>
          <br>
          <br>
          2011/1/27 MustLive <a class="moz-txt-link-rfc2396E" 
href="mailto:mustlive@xxxxxxxxxxxxxxxxxx";>&lt;mustlive@xxxxxxxxxxxxxxxxxx&gt;</a><br>
          <br>
          Hello list!<br>
          <br>
          I want to warn you about Cross-Site Scripting, Brute Force,
          Insufficient<br>
          Anti-automation and Abuse of Functionality vulnerabilities in
          SimpGB.<br>
          <br>
          -------------------------<br>
          Affected products:<br>
          -------------------------<br>
          <br>
          Vulnerable are SimpGB v1.49.02 and previous versions.<br>
          <br>
          ----------<br>
          Details:<br>
          ----------<br>
          <br>
          XSS (WASC-08):<br>
          <br>
          POST request at page <a class="moz-txt-link-freetext" 
href="http://site/guestbook.php";>http://site/guestbook.php</a> in parameters
          poster,<br>
          postingid and location in Preview function. If captcha is
          using in<br>
          guestbook, then working code of the captcha is required for
          the attack. Or<br>
          via GET request:<br>
          <br>
<a class="moz-txt-link-freetext" 
href="http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=1&amp;poster=%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;input_text=111111111111111111111111111111&amp;preview=preview">http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=1&amp;poster=%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;input_text=111111111111111111111111111111&amp;preview=preview</a><br>
          <br>
<a class="moz-txt-link-freetext" 
href="http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;poster=1&amp;input_text=111111111111111111111111111111&amp;preview=preview">http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;poster=1&amp;input_text=111111111111111111111111111111&amp;preview=preview</a><br>
          <br>
<a class="moz-txt-link-freetext" 
href="http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=1&amp;poster=1&amp;location=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;input_text=111111111111111111111111111111&amp;preview=preview">http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=1&amp;poster=1&amp;location=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;input_text=111111111111111111111111111111&amp;preview=preview</a><br>
          <br>
          Brute Force (WASC-11):<br>
          <br>
          <a class="moz-txt-link-freetext" 
href="http://site/admin/index.php";>http://site/admin/index.php</a><br>
          <br>
          Insufficient Anti-automation (WASC-21):<br>
          <br>
          <a class="moz-txt-link-freetext" 
href="http://site/admin/pwlost.php";>http://site/admin/pwlost.php</a><br>
          <br>
          In this functionality there is no protection from automated
          requests<br>
          (captcha).<br>
          <br>
          Abuse of Functionality (WASC-42):<br>
          <br>
          <a class="moz-txt-link-freetext" 
href="http://site/admin/pwlost.php";>http://site/admin/pwlost.php</a><br>
          <br>
          In this functionality it's possible to retrieve logins.<br>
          <br>
          ------------<br>
          Timeline:<br>
          ------------<br>
          <br>
          2010.11.17 - announced at my site.<br>
          2010.11.19 - informed developers.<br>
          2011.01.25 - disclosed at my site.<br>
          <br>
          I mentioned about these vulnerabilities at my site<br>
          (<a class="moz-txt-link-freetext" 
href="http://websecurity.com.ua/4690/";>http://websecurity.com.ua/4690/</a>).<br>
          <br>
          Best wishes &amp; regards,<br>
          MustLive<br>
          Administrator of Websecurity web site<br>
          <a class="moz-txt-link-freetext" 
href="http://websecurity.com.ua";>http://websecurity.com.ua</a><br>
          <br>
          <br>
          _______________________________________________<br>
          Full-Disclosure - We believe in it.<br>
          Charter: <a class="moz-txt-link-freetext" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
          Hosted and sponsored by Secunia - <a class="moz-txt-link-freetext" 
href="http://secunia.com/";>http://secunia.com/</a><br>
          <br>
          <br>
          _______________________________________________<br>
          Full-Disclosure - We believe in it.<br>
          Charter: <a class="moz-txt-link-freetext" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
          Hosted and sponsored by Secunia - <a class="moz-txt-link-freetext" 
href="http://secunia.com/";>http://secunia.com/</a><br>
        </div>
        <hr style="border-width: 1px 0pt 0pt; border-style: dotted none
          none; border-color: rgb(181, 181, 181) -moz-use-text-color
          -moz-use-text-color; height: 1px; margin: 15px 0pt 0pt;"
          class="__pbConvHr"><br>
      </div>
      <table style="padding-top: 5px;" class="__pbConvTable">
        <tbody>
          <tr>
            <td valign="top"><img
                src="cid:part1.08010202.04070904@gmail.com"
                photoaddress="laurent.gaffie@xxxxxxxxx"
                photoname="laurent gaffie"
                name="compose-unknown-contact.jpg" height="29px"
                width="29px"></td>
            <td style="padding-left: 5px;" valign="top"><a
                moz-do-not-send="true"
                href="mailto:laurent.gaffie@xxxxxxxxx"; style="color:
                rgb(0, 136, 204) ! important; text-decoration: none !
                important;">laurent gaffie</a><br>
              <font color="#888888">January 26, 2011 4:09 PM</font></td>
          </tr>
        </tbody>
      </table>
      <div style="color: rgb(136, 136, 136); margin-left: 40px;"
        __pbrmquotes="true" class="__pbConvBody"><br>
        Send your shitty stuff to <a moz-do-not-send="true"
          
href="mailto:bugtraq@xxxxxxxxxxxxxxxxx";>bugtraq@xxxxxxxxxxxxxxxxx</a><br>
        <br>
        If it's not obvious, no one give a shit here, seriously.<br>
        <br>
        <br>
        <br>
        <div>_______________________________________________<br>
          Full-Disclosure - We believe in it.<br>
          Charter: <a class="moz-txt-link-freetext" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
          Hosted and sponsored by Secunia - <a class="moz-txt-link-freetext" 
href="http://secunia.com/";>http://secunia.com/</a></div>
        <hr style="border-width: 1px 0pt 0pt; border-style: dotted none
          none; border-color: rgb(181, 181, 181) -moz-use-text-color
          -moz-use-text-color; height: 1px; margin: 15px 0pt 0pt;"
          class="__pbConvHr"><br>
      </div>
      <table style="padding-top: 5px;" class="__pbConvTable">
        <tbody>
          <tr>
            <td valign="top"><img
                src="cid:part1.08010202.04070904@gmail.com"
                photoaddress="mustlive@xxxxxxxxxxxxxxxxxx"
                photoname="MustLive" name="compose-unknown-contact.jpg"
                height="29px" width="29px"></td>
            <td style="padding-left: 5px;" valign="top"><a
                moz-do-not-send="true"
                href="mailto:mustlive@xxxxxxxxxxxxxxxxxx"; style="color:
                rgb(0, 136, 204) ! important; text-decoration: none !
                important;">MustLive</a><br>
              <font color="#888888">January 26, 2011 3:15 PM</font></td>
          </tr>
        </tbody>
      </table>
      <div style="color: rgb(136, 136, 136); margin-left: 40px;"
        __pbrmquotes="true" class="__pbConvBody"><br>
        <div>Hello list!<br>
          <br>
          I want to warn you about Cross-Site Scripting, Brute Force,
          Insufficient<br>
          Anti-automation and Abuse of Functionality vulnerabilities in
          SimpGB.<br>
          <br>
          -------------------------<br>
          Affected products:<br>
          -------------------------<br>
          <br>
          Vulnerable are SimpGB v1.49.02 and previous versions.<br>
          <br>
          ----------<br>
          Details:<br>
          ----------<br>
          <br>
          XSS (WASC-08):<br>
          <br>
          POST request at page <a class="moz-txt-link-freetext" 
href="http://site/guestbook.php";>http://site/guestbook.php</a> in parameters
          poster,<br>
          postingid and location in Preview function. If captcha is
          using in<br>
          guestbook, then working code of the captcha is required for
          the attack. Or<br>
          via GET request:<br>
          <br>
<a class="moz-txt-link-freetext" 
href="http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=1&amp;poster=%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;input_text=111111111111111111111111111111&amp;preview=preview">http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=1&amp;poster=%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;input_text=111111111111111111111111111111&amp;preview=preview</a><br>
          <br>
<a class="moz-txt-link-freetext" 
href="http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;poster=1&amp;input_text=111111111111111111111111111111&amp;preview=preview">http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;poster=1&amp;input_text=111111111111111111111111111111&amp;preview=preview</a><br>
          <br>
<a class="moz-txt-link-freetext" 
href="http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=1&amp;poster=1&amp;location=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;input_text=111111111111111111111111111111&amp;preview=preview">http://site/guestbook.php?layout=Til&amp;lang=en&amp;mode=add&amp;postingid=1&amp;poster=1&amp;location=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&amp;input_text=111111111111111111111111111111&amp;preview=preview</a><br>
          <br>
          Brute Force (WASC-11):<br>
          <br>
          <a class="moz-txt-link-freetext" 
href="http://site/admin/index.php";>http://site/admin/index.php</a><br>
          <br>
          Insufficient Anti-automation (WASC-21):<br>
          <br>
          <a class="moz-txt-link-freetext" 
href="http://site/admin/pwlost.php";>http://site/admin/pwlost.php</a><br>
          <br>
          In this functionality there is no protection from automated
          requests<br>
          (captcha).<br>
          <br>
          Abuse of Functionality (WASC-42):<br>
          <br>
          <a class="moz-txt-link-freetext" 
href="http://site/admin/pwlost.php";>http://site/admin/pwlost.php</a><br>
          <br>
          In this functionality it's possible to retrieve logins.<br>
          <br>
          ------------<br>
          Timeline:<br>
          ------------<br>
          <br>
          2010.11.17 - announced at my site.<br>
          2010.11.19 - informed developers.<br>
          2011.01.25 - disclosed at my site.<br>
          <br>
          I mentioned about these vulnerabilities at my site<br>
          (<a class="moz-txt-link-freetext" 
href="http://websecurity.com.ua/4690/";>http://websecurity.com.ua/4690/</a>).<br>
          <br>
          Best wishes &amp; regards,<br>
          MustLive<br>
          Administrator of Websecurity web site<br>
          <a class="moz-txt-link-freetext" 
href="http://websecurity.com.ua";>http://websecurity.com.ua</a> <br>
          <br>
          <br>
          _______________________________________________<br>
          Full-Disclosure - We believe in it.<br>
          Charter: <a class="moz-txt-link-freetext" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
          Hosted and sponsored by Secunia - <a class="moz-txt-link-freetext" 
href="http://secunia.com/";>http://secunia.com/</a><br>
        </div>
      </div>
    </blockquote>
  </body>
</html>

JPEG image

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/