[ZendTo] Re: Antwort: Re: Zendto is vulnerable for SQL-Injection

Jules Jules at Zend.To
Mon May 23 16:50:25 BST 2011


You will get them when I release them, which will be in the next day or two.

Jules.

On 23/05/2011 16:37, Ken Buska wrote:
> Jules,
>
> how can we get these fixes? is there a source repository somewhere?
>
> Cheers,
> Ken
>
>
>
> On Mon, May 23, 2011 at 2:52 AM, Jules <Jules at zend.to 
> <mailto:Jules at zend.to>> wrote:
>
>
>
>     On 22/05/2011 15:09, patrick.gaikowski at kaufland.com
>     <mailto:patrick.gaikowski at kaufland.com> wrote:
>>
>>     Hi,
>>
>>     we engaged a company for penetration testing of web applications
>>     and thats why i tried to be prepared....
>>
>>     I used the tool "burp suite" which is a http/https proxy for
>>     intercepting web requests / responses.
>>
>>         * i made a dropoff request without username / password -->
>>           only ReCaptcha
>>
>     Definitely a bug, now fixed. Well done!
>
>>        *
>>
>>
>>         * i intercepted the POST to dropoff.php
>>
>>
>>     /(See attached file: dropoff)/
>     Great, XML, my favourite. :-)
>
>>         * in the tool you can send the POST to the repeating module
>>           and modify the POST
>>         * i was able the send the upload a various times --> the
>>           limit will be the free space on the host system -->can be
>>           used for blow up the system and perhaps crash the system
>>
>     If you don't complete the upload, then you will be able to do
>     that. Once the upload has finished, the auth code should be
>     removed (and now is! :-) (unless you're a logged in user, at which
>     point we can hunt you down anyway).
>     I'm not particularly worried about attacks by logged in users.
>     They can just repeat the entire upload process as many times as
>     they like anyway, uploading either the same files or different
>     files each time.
>
>>        *
>>
>>
>>         * i was able to change for example the email-address of the
>>           recipient (only the domain defined in preferences.php) in
>>           the POST--> can be used for SPAM if the email domain is not
>>           configured correctly
>>
>     Agreed. You can indeed change the email address of the recipient
>     in the upload. But then again you can just make your automated
>     hacking system slightly more clever and do multiple uploads to
>     anyone you like in the the preferences.php configured domain. So I
>     am not worried about that either.
>
>>
>>     Is it possible to limit the lifetime of the auth-Parameterto only
>>     one request?
>     Well spotted, yes that is a bug. Fixed. That should take care of
>     the multiple uploads exploits you found above too.
>
>     Many thanks for finding these for me, it is much appreciated!
>
>     Cheers,
>
>     Jules
>
>     -- 
>     Julian Field MEng CITP CEng
>     www.Zend.To <http://www.Zend.To> Follow me at twitter.com/JulesFM
>     <http://twitter.com/JulesFM> PGP footprint: EE81 D763 3DB0 0BFD
>     E1DC 7222 11F6 5947 1415 B654 'All programs have a desire to be
>     useful' - Tron, 1982
>
>
>     _______________________________________________
>     ZendTo mailing list
>     ZendTo at zend.to <mailto:ZendTo at zend.to>
>     http://mailman.ecs.soton.ac.uk/mailman/listinfo/zendto
>
>
>
> _______________________________________________
> ZendTo mailing list
> ZendTo at zend.to
> http://mailman.ecs.soton.ac.uk/mailman/listinfo/zendto

Jules

-- 
Julian Field MEng CITP CEng
www.Zend.To

Follow me at twitter.com/JulesFM
PGP footprint: EE81 D763 3DB0 0BFD E1DC 7222 11F6 5947 1415 B654

'All programs have a desire to be useful' - Tron, 1982

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.ecs.soton.ac.uk/pipermail/zendto/attachments/20110523/4ed0ea33/attachment.html 


More information about the ZendTo mailing list