lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 02 Apr 2009 00:33:16 +0200
From: Matteo Beccati <php@...cati.com>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Cc: "vuln@...unia.com" <vuln@...unia.com>
Subject: [OPENX-SA-2009-002] OpenX 2.4.11, 2.6.5, 2.8.0 fix multiple vulnerabilities

========================================================================
OpenX security advisory                                OPENX-SA-2009-002
------------------------------------------------------------------------
Advisory ID:           OPENX-SA-2009-002
Date:                  2009-Apr-01
Security risk:         Critical
Applications affetced: OpenX
Versions affected:     <= 2.4.10, <= 2.6.4, <= 2.7.29-beta
Versions not affected: >= 2.4.11, >= 2.6.5, >= 2.8.0
========================================================================


========================================================================
Multiple vulnerabilities Discovered by Sandro Gauci
========================================================================

Description
-----------
A security review was recently being conducted on Openx 2.6.4 by Sandro
Gauci. As part of the review he reported the following vulnerabilities:

  - SQL injection in adview.php and other delivery scripts because of
   missing or improper validation of the "OAID" cookie;
  - SQL injection in tjs.php because of missing or improper validation
   of the "referer" GET parameter;
  - XSS vulnerability in sso-accounts.php because of missing or improper
   validation of the "email" GET parameter (2.4.x not affected)
  - Possible arbitrary file deletion in tjs.php via the "trackerid" GET
   parameter
  - Possible CRLF injection in various delivery files because of missing
   sanitisation of parameters (PHP 4.4.2 or 5.1.2 and follwing versions
   are not affected)
  - Possible arbitrary file deletion in various delivery scripts

Both the SQL injection vulnerabilities can be remotely exploited by
unauthenticated attackers: upgrading is strongly advised.

References
----------
https://developer.openx.org/jira/browse/OX-4867
http://resources.enablesecurity.com/advisories/openx-2.6.4-multiple.txt


========================================================================
Vulnerabilites previously repoted by Secunia
========================================================================

Description
-----------
A security review was previously conducted by Sarid Harper on behalf of
Secunia and led to the release of OpenX 2.4.10 and 2.6.4 fo fix a number
of vulnerabilities. He recently reported that OpenX 2.6.4 was still
vulnerable to two of them and they have been properly fixed now:

  - Input passed to the "userid" parameter in "www/admin/admin-user.php"
   is not properly sanitised before being returned to the user. This can
   be exploited to execute arbitrary HTML and script code in a user's
   browser session in the context of an affected site (#9)
  - Input passed to the "agencyid" parameter in
   "www/admin/agency-edit.php" is not properly sanitised before being
   returned to the user. This can be exploited to execute arbitrary
   HTML and script code in a user's browser session in the context of
   an affected site (#11)

References
----------
http://secunia.com/advisories/32197/
https://developer.openx.org/jira/browse/OX-4803
https://developer.openx.org/jira/browse/OX-4805
https://developer.openx.org/jira/browse/OX-4957


========================================================================
Multiple SQL injections and XSS vulnerabilities
========================================================================

Description
-----------
A security review was internally performed following Secunia's report.
A number of XSS vulnerabilities were found and fixed, plus several SQL
injection vulnerabilities:

  - SQL injection in userlog-index.php via the "advertiserId" parameter
  - SQL injection in channel-edit.php via the "affiliateid" parameter
  - SQL injection in banner-zone.php via the "bannerid" parameter

All require authentication to be exploited.



References
----------
https://developer.openx.org/jira/browse/OX-4826



Solution
========

We stronly advise people running affected versions to upgrade to the
most recent versions of OpenX: 2.4.11, 2.6.5 or 2.8.0.


Contact informations
====================

The security contact for OpenX can be reached at:
<security AT openx DOT org>

Powered by blists - more mailing lists