Network Security News – Thursday, May 19, 2005 Events
Help Center Live chat_download.php fid Variable SQL Injection
Help Center Live contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'fid' variable in the chat_download.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.. Read more at osvdb.org/16658
Help Center Live icon.php status Variable SQL Injection
Help Center Live contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'status' variable in the icon.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.. Read more at osvdb.org/16657
Help Center Live download.php fid Variable SQL Injection
Help Center Live contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'fid' variable in the download.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.. Read more at osvdb.org/16656
Help Center Live view.php tid Variable SQL Injection
Help Center Live contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'tid' variable in the view.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.. Read more at osvdb.org/16655
Help Center Live faq/index.php id Variable SQL Injection
Help Center Live contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'id' variable in the faq/index.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.. Read more at osvdb.org/16654
Help Center Live view.php Cross Site Forgery
Help Center Live contains a flaw that may allow an attacker to execute arbitrary commands with elevated privileges. The issue is due to the application running user-supplied commands under the trust relationship between the server hosting the application and another machine. By embedding commands or URLs in an IMG tag, a user clicking on it may execute the command or establish a connection with a higher trust relationship than intended.. Read more at osvdb.org/16653
Help Center Live Multiple Field Arbitrary Operator Script Injection
Help Center Live contains a flaw that allows a remote script injection attack. This flaw exists because the application does not validate user-supplied input to the name or message fields upon submission to the operator scripts. This could allow a user to create a specially crafted script command that would execute arbitrary code in the operator's browser, leading to a loss of integrity.. Read more at osvdb.org/16652
Help Center Live faq/index.php find Variable XSS
Help Center Live contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'find' variable upon submission to the faq/index.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/16651
Mozilla Firefox Sidebar Panel Script Injection
Mozilla Firefox contains a flaw that may allow a malicious user to inject script code in the browser environment with the privleges of the locally-logged on user. The issue is triggered when a malicious web site is bookmarked as a sidebar panel. It is possible that the flaw may allow an attacker to run arbitrary code on the victim's machine, resulting in a loss of integrity.. Read more at osvdb.org/15009
Cisco PIX Firewall established Command Alternative Conduit Restriction Bypass
Cisco PIX Firewall contains a flaw that may allow a malicious remote user to connect to any port on a system where limited connections are explicitly allowed. The issue is triggered when the "established" command is used along with a normal conduit. The conduit is used to allow inbound traffic to a specific port on a host, for example port 25 on a mail server. The "established" command provides support for multiconnection protocols, where a host makes connection to an external host on one port, and the external host responds with an inbound connection on another port. If the firewall is configured with both a conduit and an "established" command for a host, it would be possible for a remote attacker to make a connection to the allowed port through the conduit, and then make a connection to any other port, bypassing normal firewall restrictions. If an attacker is able to make a connection to an FTP server that supports the PORT command, it is possible that the flaw may allow subsequent connections to any host behind the firewall, resulting in a potential loss of integrity.. Read more at osvdb.org/16644
Leave a Reply