exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files from John Fitzpatrick

Email addressjohn.fitzpatrick at mwrinfosecurity.com
First Active2014-02-11
Last Active2021-01-18
IBM Spectrum LSF 10.1 / 10.2 Hardcoded Eauth Key / Eauth Key Exposure
Posted Jan 18, 2021
Authored by John Fitzpatrick

IBM Spectrum LSF versions 10.1 and 10.2 suffer from hardcoded eauth key and eauth key exposure vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2020-4983
SHA-256 | 7b805922df0af9a8af46eb5021d5ad516d5d2b44e2d6fc8f4bd24f60749d3a03
BeeGFS 7.1.3 Privilege Escalation
Posted Dec 5, 2019
Authored by John Fitzpatrick

BeeGFS versions 7.1.3 and below suffer from a privilege escalation vulnerability.

tags | advisory
advisories | CVE-2019-15897
SHA-256 | d30029c1850a3b316562ecfdf0823e70e5d8b72548aae0f53565d9c31f6d8df9
PBS Professional 19.2.3 Authentication Bypass
Posted Oct 9, 2019
Authored by John Fitzpatrick

PBS Professional versions 19.2.3 and below suffer from an authentication bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2019-15719
SHA-256 | 4e778bfddd48fd678b80e1ee642c5e78739451b4e2a52e2e2396245a985f8e41
IBM Spectrum LSF Privilege Escalation
Posted Mar 16, 2018
Authored by John Fitzpatrick

A vulnerability was identified within IBM Spectrum LSF which made it was possible to impersonate other users when submitting jobs for execution. Additionally, it was found to be possible to impersonate and execute jobs as root, even where root job submission is disabled. Versions affected include 8.3, 9.1.1, 9.1.2, 9.1.3, 10.1, and 10.1.0.1.

tags | advisory, root
advisories | CVE-2017-1205
SHA-256 | 2efba7f49de16c0ab91885eec21b6040948eb64801f0eac0a8e9a23a88545d52
DDN SFA Default SSH Keys
Posted Jun 15, 2016
Authored by John Fitzpatrick

DDN controllers ship with a set of static entries within the authorized_keys file of several of the user accounts. The corresponding private keys can be obtained from publicly available sources.

tags | exploit
SHA-256 | 470b91b64442d28eebb33a4f527381613c2b67ad4b238cb3ab10d5b46ca3f8e7
DDN SFA Privilege Escalation
Posted Jun 15, 2016
Authored by John Fitzpatrick

DDN SFA suffers from a privilege escalation vulnerability.

tags | advisory
SHA-256 | 8685f5cd2b43437141d6700fcd38911bb8804b7c0342311a9bbe76773a26134b
IBM GPFS / Spectrum Scale Command Injection
Posted Jun 8, 2016
Authored by John Fitzpatrick

IBM GPFS version 4.1.0.0 through 4.1.0.8 and 3.5.0.0 through 3.5.0.30 along with Spectrum Scale versions 4.2.0.0 through 4.2.0.2 and 4.1.1.0 through 4.1.1.6 suffer from a command injection vulnerability.

tags | advisory
advisories | CVE-2016-0392
SHA-256 | d5a184120f34553d5a3f070fe73506ebbb75681cf01c038a98e3fde9002113f4
SGI Tempo Database Exposure
Posted Dec 10, 2014
Authored by John Fitzpatrick

It is possible for users of ICE-X supercomputers to gain access to backups of system configuration databases.

tags | exploit, info disclosure
advisories | CVE-2014-7303
SHA-256 | a3391d3f24f884f8882a5a413fe59541e6c85c96d2bdb3446ccde65cf7207df8
SGI Tempo Database Password Disclosure
Posted Dec 10, 2014
Authored by John Fitzpatrick

SGI Tempo systems expose a database password in the world readable /etc/odapw file.

tags | exploit, info disclosure
advisories | CVE-2014-7301
SHA-256 | 33068bfa9903902198ab1a1def7493a5b1147e1e5e632e0bac53597bf97cf900
SGI Tempo vx Setuid Privilege Escalation
Posted Dec 10, 2014
Authored by Luke Jennings, John Fitzpatrick, MWR Labs

/opt/sgi/sgimc/bin/vx, a setuid binary on SGI Tempo systems, allows for privilege escalation.

tags | exploit
advisories | CVE-2014-7302
SHA-256 | c32b2f12effe553e70e04d4889e25819691bd3ba3e5cc606cab0fa53442de067
Moab Insecure Message Signing Authentication Bypass
Posted Sep 30, 2014
Authored by Luke Jennings, John Fitzpatrick

Moab suffers from an insecure message signing authentication bypass vulnerability. All versions up to 8 can be affected depending on the configuration.

tags | exploit, bypass
advisories | CVE-2014-5376
SHA-256 | 85a019a8c4de29f5f84586a14f07c354e859db1b6a19ccec9cbb5d70e45cbcea
Moab User Impersonation
Posted Sep 30, 2014
Authored by John Fitzpatrick

Moab versions prior to 7.2.9 and 8 suffer from a user impersonation vulnerability.

tags | exploit
advisories | CVE-2014-5375
SHA-256 | 06269ab2431aa1292e9d181643ace50442b15f7c22b2ca8e0be470c5e444f592
Moab Dynamic Configuration Authentication Bypass
Posted Sep 30, 2014
Authored by John Fitzpatrick

Moab versions prior to 7.2.9 and 8 suffer from a dynamic reconfiguration authentication bypass issue that allows for remote code execution.

tags | exploit, remote, code execution, bypass
advisories | CVE-2014-5300
SHA-256 | 1d947c3d312bda1ccebc5c7622d54bcdfee0aa44575fcd3b9fa4410d0c6e6878
Torque 2.5.13 Buffer Overflow
Posted May 16, 2014
Authored by John Fitzpatrick

Torque versions 2.5.13 and below suffer from a buffer overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2014-0749
SHA-256 | d70ac68760be26990412a9557c8ba8998fd61ae6ed3c065bbd16318b9e99b85a
Cray Aprun / Apinit Privilege Escalation
Posted Feb 11, 2014
Authored by Luke Jennings, John Fitzpatrick | Site mwrinfosecurity.com

Apinit and aprun are utilities used to schedule tasks on Cray supercomputers. Apinit runs as a service on compute nodes and aprun is used to communicate with these nodes. The apinit service does not safely validate messages supplied to it through the use of aprun. Users of Cray systems are able to exploit this weakness in order to execute commands on the compute nodes of a Cray supercomputer as arbitrary users, including root (UID 0).

tags | exploit, arbitrary, root
advisories | CVE-2014-0748
SHA-256 | 35dc2988dfa5b20f94f03cac3407ffef1d10ffa10d1fe9bd41390ba183fc8f33
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close