Thursday, March 29, 2012

HTB23078: ocPortal multiple vulnerabilities

ocPortal version 7.1.5 suffers from a cross-site scripting (XSS) and arbitrary file disclosure vulnerabilities:
1. Cross-site scripting (XSS): Input passed via the "path" and "line" GET parameters to "/code_editor.php" script is not properly sanitised before being returned to the user.
2. Arbitrary file disclosure: Input passed via the "file" GET parameter to "/site/catalogue_file.php" script is not properly sanitised before being used in fopen() call.

Vulnerability ID: HTB23078
Vendor Notification / Patch / Public Disclosure Dates: 29 February / 21 March / 28 March
Vulnerabilities Type: Cross-Site Scripting (XSS), Arbitrary File Disclosure
Solution Status: Fixed by Vendor
Risk level: High
Solution: Upgrade to 7.1.6 or later version

Tuesday, March 27, 2012

GS Days 2012 (April, 3)

For the second time High-Tech Bridge participates as a Gold Sponsor at GS Days: "Journées Francophones de la Sécurité". This event will focus on the reality of today's threats, their simplicity and impact in Information Security. We look forward to seeing you there and discuss any security related topics. Registration available here.

"GS DAYS, JOURNEES FRANCOPHONES DE LA SECURITE"
The 4th edition of GS Days’ theme will be: "La Sécurité par la pratique"
Tuesday, 3 Arpil 2012 at l'Espace Saint-Martin (Paris 3è)
from 08:30AM to 06:30PM
GS Days 2012 Program

Also, High-Tech Bridge is a Sponsor at the eCom 2012.

Source: High-Tech Bridge: GOLD sponsor at GS Days 2012

Wednesday, March 21, 2012

HTB23079: Open Journal Systems (OJS) vulnerabilities

Open Journal Systems (OJS) version 2.3.6 suffers from an Arbitrary File Manipulation and Upload, cross-site scripting (XSS) vulnerabilities:
1. Arbitrary File Manipulation: Arbitrary File Deletion via the "param" parameter to "/lib/pkp/lib/tinymce/jscripts/tiny_mce/plugins/ibrowser/scripts/rfiles.php", Arbitrary File Renaming via the "param" parameter to "/lib/pkp/lib/tinymce/jscripts/tiny_mce/plugins/ibrowser/scripts/rfiles.php" script.
2. Arbitrary File Upload: Upper-register file extensions are not filtered (e.g. ".pHp"), as well as some potentially malicious file extensions (e.g. ".asp", ".cgi", ".html").
3. XSS: Input passed via the "editor" and "callback" parameters to "/lib/pkp/lib/tinymce/jscripts/tiny_mce/plugins/ibrowser/ibrowser.php", "URL" parameter to "index.php", "String::stripUnsafeHtml()" method in "/lib/pkp/classes/core/String.inc.php" are vulnerable to perform cross-site scripting attacks.

Vulnerability ID: HTB23079
Vendor Notification / Vendor Patch / Public Disclosure Dates: 29 February / 16 March / 21 March
Vulnerabilities Type: Arbitrary File Manipulation, Arbitrary File Upload, Cross Site Scripting (XSS)
Solution Status: Fixed by Vendor
Risk level: Critical
Solution: Upgrade to the latest version

Read the full version of this security advisory HTB23079.

Friday, March 16, 2012

High-Tech Bridge website is now available at htbridge.com

Website of High-Tech Bridge is now available by address www.htbridge.com since the 13th of March (this tuesday). All previous links are redirected to the new domain.

This transition to .com domain is associated with the expansion to the global information security market. The site structure has remained the same. All the email addresses on @htbridge.ch domain will stay usable for the future.

Wednesday, March 14, 2012

HTB23076: Multiple vulnerabilities in Elefant CMS

Elefant CMS version v1.1.3 beta suffers from a cross-site scripting (XSS) and SQL Injection vulnerabilities:
1. XSS: Input passed via the "title" and "body" GET parameters to "/admin/preview" ("apps/admin/handlers/preview.php" script) is not properly sanitised before being returned to the user.
2. SQL Injection: Input passed via the "offset" GET parameter to "/admin/pages", "/admin/versions", "/user/admin", "/blocks/admin", "/blog/admin" ("lib/Model.php" script) is not properly sanitised before being used in SQL query.

Vulnerability ID: HTB23076
Vendor Notification / Vendor Patch / Public Disclosure Dates: 22 February / 22 February / 14 March
Vulnerabilities Type: Cross Site Scripting (XSS), SQL Injection
Solution Status: Fixed by Vendor
Risk level: Medium
Solution: Upgrade to the latest version

Thursday, March 8, 2012

Sponsor at the eCom 2012 (April, 24)

High-Tech Bridge, official sponsor in Business IT at the eCom 2012 exhibition, will introduce its areas of expertise and will use this opportunity to highlight and present our added values in the market of computer security.

"ECOM 2012 - SALON SUISSE DU E-BUSINESS"
This event will be held on the 24th of april 2012 from 09:00AM to 18:30PM
At the Centre de congrès - Geneva Palexpo
Route François-Peyrot 30
1218 Le Grand Saconnex / Genève – Suisse
Tel : + 41 (0)800 804 408

Other upcoming events:

Source: High-Tech Bridge: Sponsor at the eCom 2012

Wednesday, March 7, 2012

HTB23075: Fork CMS XSS vulnerabilities

Fork CMS version 3.2.5 suffers from a cross site scripting vulnerabilities:
Input passed via the: "type" and "querystring" GET parameters to "/private/en/error"; "name" GET parameter to "/private/en/locale/index" is not properly sanitised before being returned to the user.

Vulnerability ID: HTB23075
Vendor Notification / Vendor Patch / Public Disclosure Dates: 15 February / 28 February / 7 March
Vulnerabilities Type: Cross Site Scripting (XSS)
Solution Status: Fixed by Vendor
Risk level: Medium

Friday, March 2, 2012

High-Tech Bridge participates at UNI-Emploi 9th Forum (March, 14)

UNI-Emploi 9th Forum

"THE CONTACT PLATEFORM BETWEEN COMPANIES AND STUDENTS AT THE UNIVERSITY OF GENEVA"
Will be held from the 6 to the 15 of March 2012
Boulevard du Pont D'Arve 40 - 1205 Geneva

The High-Tech Bridge team looks forward to welcoming you on the 14th of March from 02:15PM to 03:45PM at Uni-Mail (Room M4389).

Related links:
High-Tech Bridge participates at UNI-Emploi 9th Forum
Tables rondes - Forum Uni-emploi