Friday, August 31, 2012

High-Tech Bridge office photos

High-Tech Bridge slightly lifted the veil of secrecy, and now we can see photos of the new company office.

High-Tech Bridge office photos

You can also find other photos of High-Tech Bridge's Office. High-Tech Bridge is located on World Trade Center II, Geneva.

High-Tech Bridge Security Research Lab obtains "CWE-Compatible" status

High-Tech Bridge is pleased to announce that Security Advisories by High-Tech Bridge Security Research Lab achieved the final stage of MITRE's formal CWE Compatibility Process and have now "Officially CWE-Compatible" status.

High-Tech Bridge security advisories are now one from 17 CWE-Compatible information security products and services.

CWE Compatible The Common Weakness Enumeration (CWE™) is a list of software weaknesses that aims to provide classification mechanism for vulnerabilities. Creating the list is a community initiative. Together, these organizations and any others that wish to join the effort, are creating specific and succinct definitions for each of the elements in the CWE List. Read more about CWE here.

Certificate of CWE Compatibility:
Certificate of CWE Compatibility: High-Tech Bridge Security Advisories
High-Tech Bridge SA's High-Tech Bridge Security Advisories are CWE Compatible

Also, Security Advisories by High-Tech Bridge Research Lab recently obtained "CVE-Compatible" Status, so high-tech bridge advisories are now CVE- and CWE-compatible.

Thursday, August 30, 2012

HTB23109: XSS in Phorum 5.2.18

Phorum This week details about cross-site scripting (XSS) vulnerability (CVE-2012-4234, HTB23109) in Phorum version 5.2.18 were disclosed by High-Tech Bridge Security Advisories.

Vulnerability details: input passed via the "group" GET parameter to "control.php" script is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in user's browser session in context of an affected website.

Phorum is open source PHP forum software with a penchant for speed. Phorum's very flexible hook and module system can satisfy every web master's needs.

Last friday Phorum 5.2.19 released, wich contain a security fix for this vulnerability. Details available on vendor's website.

HTB23091: PrestaShop 1.4.7-1.4.8 cross-site scripting vulnerabilities

PrestaShop PrestaShop versions 1.4.7, 1.4.8 and probably prior is vulnerable to cross-site scripting attacks. These days information about this vulnerability were published (HTB23091) by High-Tech Bridge Security Research Lab.

Cross-Site Scripting (XSS) vulnerability in PrestaShop (CVE-2012-2517) existed because input passed via the "product" POST parameter to "ajax.php" script is not properly sanitised before being returned to the user. According to Security Glossary, XSS (Cross Site Scripting) is a web application vulnerability that allows to inject arbitrary HTML or scripting code into the web page content.

PrestaShop is the most reliable and flexible Free Open-source e-commerce software. Since 2007, PrestaShop has revolutionized the industry by providing features that engage shoppers and increase online sales.

Founded vulnerability is now fixed, all users can update their installations to PrestaShop v1.4.9.

On High-Tech Bridge's facebook page we can see, that "XSS & CSRF: Exploitation pratique des vulnérabilités" article was published by Hakin9 Magazine. I wish you a pleasant reading.

Thursday, August 16, 2012

HTB23104: Cross-site scripting (XSS) vulnerability in Jease

Jease CMS

Vulnerability in Jease version 2.8 (and probably prior) has been discovered, which can be exploited to perform cross-site scripting (XSS) attacks. Advisory details were published on High-Tech Bridge Security Advisories page.

Cross-site scripting (XSS) vulnerability in Jease (CVE-2012-4052) existed because input passed via the "author", "subject" and "comment" POST parameters when creating a new comment was not properly sanitised before being returned to the user. According to Wikipedia, Cross-site scripting (XSS) is a type of computer security vulnerability, that enables attackers to inject client-side script into Web pages viewed by other users.

Jease Content Management System is an Open Source CMS which is driven by the power of Java. Jease means "Java with Ease", so Jease promises to keep simple things simple and the hard things (j)easy.

Vulnerability now have status "Fixed", you should upgrade your Jease installation to 2.9 version.

On twitter of High-Tech Bridge we can also see that other advisory about Flogr was published this week. Details will be published later.

Friday, August 10, 2012

HTB23101: PBBoard 2.1.4 multiple vulnerabilities

PBBoard Community Forum

PBBoard Community Forum version 2.1.4 suffers from SQL injection, improper authentication and improper access control vulnerabilities.

  1. SQL injection: Input passed via the "username", "email", "password", "section", "section_id", "member_id", "subjectid" POST parameters to "index.php" script is not properly sanitised before being used in a SQL query.
  2. Improper Authentication: PBBoard permits to change password of any board member due to absence of any verification of user-supplied "member_id" POST parameter in the password change script.
  3. Improper Access Control: Input passed via the "xml_name" POST parameter to "admin.php" is not properly sanitised before being used as a name of a newly created file.

Vulnerability ID: HTB23101
Vendor Notification / Patch / Public Disclosure Dates: July 18 / August 6 / August 8, 2012
Vulnerabilities Type: SQL injection, improper authentication , improper access control
Risk level: Medium
Solution Status: Fixed by Vendor, Apply 5-8-2012 Security Patch (http://www.pbboard.com/forums/index.php?page=download&attach=1&id=4984)

You can find full text with additional conditions and PoC-examples on HTB advisory page: PBBoard multiple vulnerabilities.

HTB23100: phpList 2.10.18 cross-site scripting and SQL injection vulnerabilities

phpList

phpList version 2.10.18 suffers from SQL injection and cross-site scripting (XSS) vulnerabilities.

  1. SQL injection: Input passed via the "delete" GET parameter to "admin/index.php" script (when "page" is set to "editattributes") is not properly sanitised before being used in SQL query.
  2. Cross-site scripting (XSS): Input passed via the "unconfirmed" GET parameter to "admin/index.php" script (when "page" is set to "user") is not properly sanitised before being returned to the user.

Vulnerability ID: HTB23100
Vendor Notification / Patch / Public Disclosure Dates: July 11 / August 2 / August 8, 2012
Vulnerabilities Type: XSS, SQL Injection
Risk level: Medium
Solution Status: Fixed by Vendor, upgrade to phpList 2.10.19

See details and PoC-examples for this advisory: phpList multiple vulnerabilities.