Friday, May 11, 2012

HTB23080: OrangeHRM multiple vulnerabilities

OrangeHRM version 2.7 RC and probably prior suffers from SQL injection and cross-site scripting (XSS) vulnerabilities:
1. SQL Injection: Input passed via the "hspSummaryId" GET parameter to "plugins/ajaxCalls/haltResumeHsp.php" script is not properly sanitised before being used in SQL "UPDATE" query.
3. Cross-Site Scripting (XSS): Input passed via the "newHspStatus" GET parameter to "plugins/ajaxCalls/haltResumeHsp.php", "sortOrder" GET parameter to "templates/hrfunct/emppop.php", "uri" GET parameter to "index.php" scripts are not properly sanitised before being returned to the user.

Vulnerability ID: HTB23080
Vendor Notification / Patch / Public Disclosure Dates: 7 March / 24 April / 9 May 2012
Vulnerabilities Type: SQL injection, Cross-site scripting (XSS)
Risk level: High
Solution Status: Fixed by Vendor, upgrade to OrangeHRM 2.7 Stable Release.

Thursday, May 10, 2012

HTB23087: PivotX cross-site scripting (XSS) vulnerability

PivotX

PivotX version 2.3.2 and probably prior suffers from cross-site scripting (XSS) vulnerability:
Input passed via the "file" GET parameter to "pivotx/ajaxhelper.php" is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in administrator's browser session in context of the affected website. Input passed via the "file" GET parameter to "pivotx/ajaxhelper.php" script is not properly sanitised before being returned to the user.

Vulnerability ID: HTB23087
Vulnerability Type: Cross-Site Scripting (XSS)
Risk level: Medium
Vendor Notification / Patch / Public Disclosure Dates: 18 April / 18 April / 9 May 2012
Solution: Fixed in svn repository. Apply vendor's patch.

Thursday, May 3, 2012

HTB23086: PluXml Local File Inclusion

PluXml version 5.1.5 and probably prior suffers from Local File Inclusion (LFI) vulnerability:
Input passed via the "default_lang" POST parameter to "update/index.php" is not properly verified before being used in "include_once()" function and can be exploited to include arbitrary local files. This can be exploited to include local files via directory traversal sequences and URL-encoded NULL bytes.

Vulnerability ID: HTB23086
Vendor Notification / Patch / Public Disclosure Dates: 11 April / 16 April / 2 May 2012
Vulnerabilities Type: Local File Inclusion (LFI)
Risk level: High
Solution: Fixed by Vendor, Upgrade to PluXml 5.1.6

Read full information and details about this advisory: High-Tech Bridge Advisory HTB23084: Local File Inclusion in PluXml.

A Frost & Sullivan White Paper: The Importance of Ethical Hacking: Emerging Threats Emphasise Need for Holistic Assessments (From SlideShare)

An online version of the White Paper is available on SlideShare. Read more about this white paper here at htbridge.blogspot.com: The Importance of Ethical Hacking: Emerging Threats Emphasise Need for Holistic Assessments.

Tuesday, May 1, 2012

Hackers could target medical devices (Planète Santé, french article)

Interesting article "Les hackers ciblent les dispositifs médicaux" / "Hackers could target medical devices" was published at Planète Santé (30/04/2012).

Prendre le contrôle à distance d’une pompe à insuline, voici la démonstration que des experts en sécurité informatique ont faite à plusieurs reprises l’an dernier. Faut-il pour autant renoncer à ces dispositifs médicaux que l’on peut piloter via des logiciels informatiques? Certainement pas répondent les experts.

Read more: Les hackers ciblent les dispositifs médicaux in french.

Wednesday, April 25, 2012

HTB23085: Piwigo multiple vulnerabilities (Directory Path Traversal, XSS)

Piwigo version 2.3.3 suffers from a Directory Path Traversal and cross-site scripting (XSS) vulnerabilities:
1. Directory Path Traversal: Input passed via the "language" GET parameter to "upgrade.php" is vulnerable to directory path traversal.
2. Cross-site scripting (XSS): Input passed via the "section", "installstatus", "theme" GET-parameters to "admin.php" are not properly sanitised before being returned to the user.

Vulnerability ID: HTB23085
Vendor Notification / Patch / Public Disclosure Dates: 4 April / 8 April / 25 April
Vulnerabilities Type: Directory Path Traversal, Cross-Site Scripting (XSS)
Risk level: Medium
Solution Status: Fixed by Vendor, Upgrade to Piwigo 2.3.4

Friday, April 20, 2012

The Importance of Ethical Hacking: Emerging Threats Emphasise Need for Holistic Assessments, Says Frost & Sullivan

Frost & Sullivan's White Paper Recognises Complex Threat Landscape and Analyses Role of Ethical Hacking in Enterprise Security Architecture

LONDON, April 19, 2012 /PRNewswire/ -- The need for more effective information security practices is increasingly evident with each security breach reported in the media. When adopting new technologies like cloud computing, virtualisation, or IT outsourcing, enterprises are facing imminent security threats and must adjust their security processes, policies, and architectures accordingly. Among the many options available to help customers to achieve this goal, organisations should consider the value of ethical hacking services, which are rapidly gaining attention as an essential security practice that should be performed on a regular basis.

The recently published white paper entitled "The Importance of Ethical Hacking: Emerging Threats Emphasise the Need for Holistic Assessments" by Frost & Sullivan, discusses benefits from independent ethical hacking assessments, the role of ethical hacking in an enterprise security architecture, as well as top technical concerns and solutions. "The increased sophistication and success rate for recent cyber attacks is directly related to the shift in attacker profile, indicating that nation-states and large criminal organisations are funding well organised, highly motivated, and well trained teams of programmers," points out Frost & Sullivan Industry Analyst, Chris Rodriguez. "The elevated threat landscape therefore, urgently dictates the need for a comprehensive, real-world assessment of an organisation's security posture. This assessment is a first vital step to enact effective security policies, procedures, and infrastructure that will prevent or mitigate the effects of a data breach."

The major challenge for businesses is the complexity of security requirements due to changing hacking tactics, myriad security vulnerabilities, evolving business practices, new business technologies, and emerging security technologies. Those numerous organisation-specific security challenges are best solved by professionals with extensive expertise.

Ethical hacking offers an objective analysis of an organisation's information security posture for organisations of any level of security expertise. The ethical hacking organisation has no knowledge of the company's systems other than what they can gather. Hackers must scan for weaknesses, test entry points, prioritise targets, and develop a strategy that best leverages their resources. The objectiveness of this kind of security assessment has a direct impact on the value of the whole evaluation.

"The result of such an assessment is an actionable report with valuable remediation advice tailored to the customer's unique IT environment, capabilities, and security objectives," says Chris Rodriguez. "This helps businesses to prioritise their security efforts, fine-tune security tools such as firewalls and Intrusion Prevention Systems (IPS) devices, adjust policies, and identify any necessary training."

As organisations of all sizes and sophistication levels can benefit from objective, expert, third-party analysis, ethical hacking has become a more mainstream service in the past decade. "However, businesses still remain sceptical about the risk inherent with inviting a third-party to attempt to access sensitive systems and resources. To reduce this fear, businesses should hire only ethical hacking companies that implement practices to ensure privacy and confidentiality. They should also be accredited by international trade organisations such as the EC-Council and International Information Systems Security Certification Consortium (ISC)," advices Rodriguez.

Ensuring effectiveness of the enterprise security architecture should be verified on a regular basis. This represents a great challenge for increasingly sophisticated organisations due to complex IT environments which include security solutions, end-user awareness, policies, and new technologies. These systems not only change continually but also interoperate with each other and therefore must be tested as part of holistic assessment to best emulate a real-world attack scenario. "Ethical hacking services are the best way to attain valuable assessments and recommendations necessary to properly tune these complex security architectures," summarises Chris Rodriguez.

Frost & Sullivan has conducted extensive research in the ethical hacking market to identify latest trends in the European industry and published the white paper entitled "The Importance of Ethical Hacking: Emerging Threats Emphasise the Need for Holistic Assessments". This research has recognised High-Tech Bridge, a Swiss based company, as one of the market leaders and best service providers in the ethical hacking industry. If you would like to obtain a free copy of the white paper, please contact Joanna Lewandowska, Corporate Communications, at Joanna.lewandowska (at) frost.com. Please include your full contact details in the query.

About Frost & Sullivan

Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth and achieve best-in-class positions in growth, innovation and leadership. The company's Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined research and best-practice models to drive the generation, evaluation, and implementation of powerful growth strategies. Frost & Sullivan leverages 50 years of experience in partnering with Global 1000 companies, emerging businesses and the investment community from more than 40 offices on six continents. To join our Growth Partnership, please visit http://www.frost.com.

About High-Tech Bridge

High-Tech Bridge SA provides companies, governmental agencies and international organizations with cutting-edge information security services. For more information please visit: https://www.htbridge.com.

Contact:

Joanna Lewandowska
Corporate Communications – Europe, Frost & Sullivan
Tel: +48 22 481 62 20
E-mail: joanna.lewandowska (at) frost.com

Source: Yahoo! Finance
Related Links:
The Importance of Ethical Hacking: Emerging Threats Emphasise Need for Holistic Assessments, Says Frost & Sullivan
Frost & Sullivan recognizes High-Tech Bridge as a market leader