Monday, April 28, 2008
Friday, April 25, 2008
[WEB SECURITY] A New Class of Vulnerability in Oracle: Lateral SQL Injection
I've just released some research that demonstrates a new class of
vulnerability in Oracle and how it can be exploited by an attacker. You can
grab the paper from here:
http://www.databasesecurity
Cheers,
David Litchfield
NGSSoftware Ltd
http://www.ngssoftware.com/
http://www.davidlitchfield.com
--
E-MAIL DISCLAIMER
The information contained in this email and any subsequent
correspondence is private, is solely for the intended recipient(s) and
may contain confidential or privileged information. For those other than
the intended recipient(s), any disclosure, copying, distribution, or any
other action taken, or omitted to be taken, in reliance on such
information is prohibited and may be unlawful. If you are not the
intended recipient and have received this message in error, please
inform the sender and delete this mail and any attachments.
The views expressed in this email do not necessarily reflect NGS policy.
NGS accepts no liability or responsibility for any onward transmission
or use of emails and attachments having left the NGS domain.
NGS and NGSSoftware are trading names of Next Generation Security
Software Ltd. Registered office address: 52 Throwley Way, Sutton, SM1
4BF with Company Number 04225835 and VAT Number 783096402
------------------------------
Join us on IRC: irc.freenode.net #webappsec
Have a question? Search The Web Security Mailing List Archives:
http://www.webappsec.org/lists
Subscribe via RSS:
http://www.webappsec.org/rss
Thursday, April 24, 2008
It takes two hands to clap
What i really can't stand is the ingrained attitude shown (not just in her, but when seen in some people around sometimes), that only the people around her are wrong, and that she's perfectly right always.
I'm really really angry, not just at her, but at how things have downward spiraled into this state.
How should i be thinking about this? I can remember a few points:
- Hypocrisy is out. Recognise and work on your own faults first before helping others with theirs. It's always easier to see and focus on others' wrong.
- In doing what's right, we must be ready also to give up on our (legal &/or moral) rights. That's exactly the way Jesus walked. The way of the cross.
- Do unto others as how you'd have others to do unto you. Not wait for others to do something as you'd like, then reciprocate.
- Anger tantamounts to murder.
Remembering what i learnt so far is the first step. But i'd sure need help to obey God in this area.
Tuesday, April 22, 2008
Question then, is why write what you/I write? If the objective was to reveal oneself in writing, then perhaps the writing should continue.
Saturday, April 19, 2008
Want to read, think and pray already so hard to do. But...still must think of something to fight this problem eh.
Thursday, April 17, 2008
Wednesday, April 16, 2008
Google XSS
Netcraft has a shorter version of the details also. Quoted below:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
An interesting cross-site scripting (XSS) vulnerability found in the Google Spreadsheets service would have allowed attackers to gain unauthorised access to other Google services, including Gmail and Google Docs.
The vulnerability was discovered by security engineer Billy Rios, and takes advantage of nuances in the way Internet Explorer handles Content-Types for webpages.
When a spreadsheet is saved and downloaded in CSV format, the Content-Type is set to "text/plain", thereby instructing the client's browser that the document should be treated as plain text. However, if HTML tags are entered into the first cell of the spreadsheet, Internet Explorer detects these tags near the start of the CSV document and instead deduces that it should be treated as HTML. This essentially allowed arbitrary HTML webpages to be served from spreadsheets.google.com, which in turn allowed JavaScript to be executed in the context of the spreadsheets.google.com site. A remote attacker could exploit this weakness by stealing the user's session cookies and hijacking their session.
Rios points out that Google cookies are valid for all google.com sub domains. This means that when a user logs in to Gmail, the Gmail cookie is also valid for other Google services, such as Google Code, Google Docs, Google Spreadsheets, and more. Cross-site scripting vulnerabilities in any of these sub domains can allow an attacker to hijack a user's session and access other Google services as if they were that user.
Google has fixed the vulnerability discovered by Rios and there have been no reports of the vulnerability being exploited by attackers.
Sunday, April 13, 2008
Saturday, April 12, 2008
Friday, April 11, 2008
Love (for her)
That's how the "for better or for worse" can be fulfilled. That's how I'd wish things to be, God willing.
Love you dear. Happy 2.5 year's anniversary ;-)
(Dated 090408)
Reviewing Practical PHP Exploitation Techniques
PHP Code Analysis - Real World Examples
Taken from GNUCITIZEN.
Tuesday, April 08, 2008
File Download Injection
- From: "Jeff Williams"
- Subject: [WEB SECURITY] Attack Technique: File Download Injection
- Date: Mon, 7 Apr 2008 15:22:15 -0400
File Download Injection
=======================
Affects most web application platforms, including Java, .NET, PHP, Cold
Fusion.
This attack involves the use of header injection, particularly the
Content-Disposition header, to subvert HTTP responses from trusted
domains. Attackers can use this technique to inject a malicious file
download with an arbitrary filename (.html, .exe, .swf, .mov, .msi,
.vbs, etc...) and arbitrary file content. Since the attack subverts an
existing HTTP request, both the URL and the downloaded file use a
trusted domain.
Some variants of the attack are surprisingly simple:
http://yourcompany.com/download?fn=attack.bat%0d%0a%0d%0awordpad
When the response for this attack arrives at the victim's browser, the
malicious file is named "attack.bat" and contains the command "wordpad"
inside. The injected file is opened as if it was a legitimate download
from the trusted domain. The attacker can inject any filename (.exe,
.bat, .html, .pdf, .sh, etc...) with any file content, and the browser
just opens it as it normally would - sometimes with a "run", "save",
"cancel" dialog and sometimes not.
Susceptible header injection vulnerabilities are frequently found in
file download pages, but could be anywhere a web application uses
untrusted input in a response header. This type of vulnerability can
exist in virtually any web application environment, including Java, .NET
and PHP.
This research builds on previous work in header injection and malicious
file execution, and adds the ability to make the attack come from
trusted domains. Although file download injection attacks are sent
through the vulnerable application on their way to the browser for
execution, they go beyond cross site scripting (XSS) as any file type
can be injected. The attack is also different from HTTP response
splitting as no second response is generated. Instead, the content of
the original response is replaced.
The paper examines various aspects of the attack, including both stored
and hidden variants and issues related to Content-Length. Some advanced
techniques for bypassing naive defenses are discussed. Finally, the
requirements for a strong defense are presented. Organizations are
encouraged to find and eliminate header injection vulnerabilities based
on the severity of this attack.
Full details in the white paper here:
http://www.aspectsecurity.com/documents/Aspect_File_Download_Injection.pdf
--Jeff
Jeff Williams
Aspect Security
Monday, April 07, 2008
Setting environment variables in Vista's user account
In XP, we usually set our environment variables using the advanced system settings dialog box, which can be found in Vista also.
The problem comes when we're running in user mode, and we need to change the environment variables. Vista's UAC would kick in, and we end up changing environment variables for the administrator account instead.
The solution to this would be to go to Control Panel -> User Accounts. There, click on the link to change the environment variables for the user account, and edit away!
Sunday, April 06, 2008
Intel unveils new remote lock-out technology for stolen laptops
Interesting technology to have, but I wonder how long before someone manages to use it for a DOS attack?