exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2019-01-01

SugarCRM Web Logic Hooks Module Path Traversal
Posted Jan 1, 2019
Authored by EgiX | Site karmainsecurity.com

SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a path traversal vulnerability. User input passed through the "webhook_target_module" parameter is not properly sanitized before being used to save PHP code into the hooks file through the Web Logic Hooks module. This can be exploited to carry out path traversal attacks and e.g. create arbitrary directories. Successful exploitation of this vulnerability requires admin privileges.

tags | exploit, web, arbitrary, php
SHA-256 | f1a4888bc04dd7c2329d4b9e63f5dcf70134ff7d0aa19f7a98b29b2dbe0338e8
Debian Security Advisory 4362-1
Posted Jan 1, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4362-1 - Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code or denial of service.

tags | advisory, denial of service, arbitrary
systems | linux, debian
SHA-256 | c252e299c25ae8af09e06a4f433bfb3b26ef49dcd4832c1492e04d926a4c55f2
SugarCRM Web Logic Hooks Module PHP Code Injection
Posted Jan 1, 2019
Authored by EgiX | Site karmainsecurity.com

SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through the "trigger_event" parameter is not properly sanitized before being used to save PHP code into the 'logic_hooks.php' file through the Web Logic Hooks module. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges.

tags | exploit, web, arbitrary, php
SHA-256 | 373176d58b363fff344849e511f806e60ec800f851a6195367e4b5a93418a783
SugarCRM addLabels PHP Code Injection
Posted Jan 1, 2019
Authored by EgiX | Site karmainsecurity.com

SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through key values of the 'labels_' parameters is not properly sanitized before being used to save PHP code within the "ParserLabel::addLabels()" method when saving labels through the Module Builder. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges.

tags | exploit, arbitrary, php
SHA-256 | c7c33095fa6c3f0a02f90d6e98e9f06032661b1137f050544d06cb8446b39c1f
Oracle Application Express AnyChart Flash-Based Cross Site Scripting
Posted Jan 1, 2019
Authored by EgiX | Site karmainsecurity.com

Oracle Application Express versions prior to 5.1.4.00.08 suffer from a cross site scripting vulnerability. The vulnerability is located in the OracleAnyChart.swf file. User input passed through the "__externalobjid" GET parameter is not properly sanitized before being passed to the "ExternalInterface.call" method.

tags | exploit, xss
advisories | CVE-2018-2699
SHA-256 | fb135bb3e65032ece683796f6d00e171ccf703a496743031b7e8f5ac177dc40c
SugarCRM WorkFlow PHP Code Injection
Posted Jan 1, 2019
Authored by EgiX | Site karmainsecurity.com

SugarCRM versions prior to 7.9.4.0 and 7.11.0.0 suffer from a PHP code injection vulnerability in the WorkFlow module. User input passed through the $_POST['base_module'] parameter to the "Save" action of the WorkFlow module is not properly sanitized before being used to write data into the 'workflow.php' file. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges.

tags | exploit, arbitrary, php
SHA-256 | c37dd37284e402ffed48fdd303aebe476fab7cb38a313fcbc305fbb02e290129
SugarCRM SaveDropDown PHP Code Injection
Posted Jan 1, 2019
Authored by EgiX | Site karmainsecurity.com

SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through key values of the 'list_value' JSON parameter is not properly sanitized before being used to save PHP code when adding/saving dropdowns through the Module Builder. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges.

tags | exploit, arbitrary, php
SHA-256 | 980f9782786995d737ba7fd626d920010296ea4761e79aa483a82b1fe1b912d2
SugarCRM portal_get_related_notes SQL Injection
Posted Jan 1, 2019
Authored by EgiX | Site karmainsecurity.com

SugarCRM versions prior to 7.9.4.0 and 7.11.0.0 suffer from a remote SQL injection vulnerability. The vulnerability is located within the SOAP API, specifically into the "portal_get_related_notes()" SOAP function. User input passed through the "order_by" parameter is not properly sanitized before being used to construct an "ORDER BY" clause of a SQL query from within the "get_notes_in_contacts()" or "get_notes_in_module()" functions. This can be exploited by Portal API Users to e.g. read sensitive data from the database through time-based SQL injection attacks.

tags | exploit, remote, sql injection
SHA-256 | 8fd642b16f76870fd97e2aa38a1554554e8446dff1fee107a4b11985cc94644a
SugarCRM ConnectorsController Server-Side Request Forgery
Posted Jan 1, 2019
Authored by EgiX | Site karmainsecurity.com

SugarCRM versions prior to 7.9.4.0 and 7.11.0.0 suffer from a server-side request forgery vulnerability. The vulnerability is located within the "ConnectorsController::action_CallRest()" method. User input passed through the "url" request parameter is not properly sanitized before being used in a call to the "file_get_contents" function.

tags | exploit
SHA-256 | 73aea30f776890ef273c97076bc4e307c41eba6a7c8994f2355b433e4f8daccc
ForkCMS 5.0.6 Cross Site Scripting
Posted Jan 1, 2019
Authored by Omer Citak | Site netsparker.com

ForkCMS version 5.0.6 suffers from persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 74316e9e30d37f77385e09fb5672e439c1fe1c37908d907876dc740b12574dd3
GMP Library Information Disclosure
Posted Jan 1, 2019
Authored by Jeffrey Walton

The GMP library uses asserts to crash a program at runtime when presented with data it did not anticipate. The library also ignores user requests to remove asserts using Posix's -DNDEBUG. Asserts are a debugging aide intended for development, and using them in production software ranges from questionable to insecure.

tags | exploit
SHA-256 | 0ea40e7538d79e469e463d38a347c76e3de72e41c94a58fb82435611a73a68ac
Micro Focus Security Bulletin MFSBGN03838 1
Posted Jan 1, 2019
Authored by Micro Focus | Site microfocus.com

Micro Focus Security Bulletin MFSBGN03838 1 - A potential security vulnerability has been identified in UCMDB. The vulnerability could be remotely exploited to Remote Directory Traversal and Remote Disclosure of Privileged Information. Revision 1 of this advisory.

tags | advisory, remote
advisories | CVE-2018-18593
SHA-256 | aac434e3d2fe709c770f033ff7d24202e5628b92b79ded66afa79ccf4965ef2c
Archer GRC Platform Improper Access Control
Posted Jan 1, 2019
Authored by Dell Product Security Incident Response Team | Site dellemc.com

RSA Archer versions prior to 6.5.0.1 contain an improper access control vulnerability. A remote malicious user could potentially exploit this vulnerability to bypass authorization checks and gain read access to restricted user information.

tags | advisory, remote
advisories | CVE-2018-15780
SHA-256 | 333aa2865f86565a4167e421f942783dcaaa3ab27d3711f02029c0078efdda61
Voyager 1.1.3 Shell Upload
Posted Jan 1, 2019
Authored by Deyaa Muhammad

Voyager version 1.1.3 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | edea1199dcb26f94b9042baf87538bd89fb5e44dd3996e2736038e8033a9c68f
Gold Movies 1.0.4 Cross Site Scripting
Posted Jan 1, 2019
Authored by Deyaa Muhammad

Gold Movies version 1.0.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0d3b54741c6a714008aa9b17d73f43e29ec1f36616ea10f13dfa390b1f3a0af9
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close