lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-id: <003801c7bf1b$8a57a390$6bffff0a@MyBabies>
Date: Thu, 05 Jul 2007 16:45:33 +0100
From: NGSSoftware Insight Security Research <mark@...software.com>
To: bugtraq@...urityfocus.com, vulnwatch@...nwatch.org,
	full-disclosure@...ts.grok.org.uk
Subject: SAP Internet Graphics Server XSS and Heap Overflow

=======
Summary
=======
Name: SAP Internet Graphics Server XSS and Heap Overflow
Release Date:  5 July 2007
Reference: NGS00487
Discover: Mark Litchfield <mark@...software.com>
Vendor: SAP
Vendor Reference: SECRES-288
Systems Affected:
Risk: Medium
Status: Fixed

========
TimeLine
========
Discovered:  4 January 2007
Released: 19 January 2007
Approved: 27 January 2007
Reported:  8 January 2007
Fixed: 18 January 2007
Published:

===========
Description
===========
The SAP IGS overflow had previously been reported.  The fix went out on
the 18th Jan.  Despite being reported on the 8th Jan, NGS did not receive
any credit.  The advisory that was posted by the other security researcher
can be found at -
http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_SAP_IGS_Remote_Buffer_Overflow.pdf.
 See attached note

The XSS issue however is still being treated by SAP as a vulnerability.

=================
Technical Details
=================
http://10.1.1.30:40180/ADM:GETLOGFILE?PARAMS=<script>alert("hello")</script>

===============
Fix Information
===============
Please ensure you have the latest version

NGSSoftware Insight Security Research
http://www.ngssoftware.com/
http://www.databasesecurity.com/
http://www.nextgenss.com/
+44(0)208 401 0070 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ