lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <552641140.20030317161808@securityoffice.net>
From: ts at securityoffice.net (Tamer Sahin)
Subject: [SecurityOffice]  Netcharts XBRL Server v4.0.0 Information Leakage Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: MD5

- --[ Netcharts XBRL Server v4.0.0 Information Leakage Vulnerability ]--

- --[ Type

Information Leakage

- --[ Release Date

March 17, 2003

- --[ Product / Vendor

NetCharts XBRL Server 4.0 is a data visualization service that generates
charts and graphs, tables, and reports. It can be used alone or

in conjunction with any web infrastructure from the simplest CGI scripts
to the most sophisticated Enterprise Application Server.


Any data source?
   - Oracle
   - Sybase
   - Any JDBC
   - Any ODBC: Excel, Access, SQL Server
   - Legacy systems
   - XBRL
   - XML
   - 
and others

Anyhow, anywhere?
   - TIFF, BMP, JPEG
   - Java Applets
   - Flash, PDF, HTML pages
   - J2EE
   - COM / ASP / .NET
   - Cold Fusion
   - 
and more

http://www.visualmining.com

- --[ Summary

A client may connect to the target machine and deliver several requests
with an invalid chunked encoded body.

The potential for information leakage is great but the risk is mitigated
somewhat by the unpredictability of the query-response
desynchronisation. Depending on the target site this may be somewhat
exploitable by a malicious user to redirect other users to a

specific response by saturating the communcation channels with a desired
response.

==================== SNIP ====================

GET /index.jsp HTTP/1.1
Host: victim.com
Transfer-Encoding: Chunked

53636f7474

==================== SNIP ====================

Related:
Recently disclosured advisory:
http://online.securityfocus.com/bid/6320

- --[ Tested

Netcharts XBRL Server v4.0.0 for Windows 2000

- --[ Vulnerable

Netcharts XBRL Server v4.0.0 for Windows 2000

- --[ Disclaimer

http://www.securityoffice.net is not responsible for the misuse or illegal
use of any of the information and/or the software listed on this

security advisory.

- --[ Author

Tamer Sahin
ts@...urityoffice.net
http://www.securityoffice.net

All our advisories can be viewed at http://www.securityoffice.net/articles/

Please send suggestions, updates, and comments to feedback@...urityoffice.net

(c) 2002 SecurityOffice

This Security Advisory may be reproduced and distributed, provided that this
Security Advisory is not modified in any way and is

attributed to SecurityOffice and provided that such reproduction and distribution
is performed for non-commercial purposes.

Tamer Sahin
http://www.securityoffice.net

-----BEGIN PGP SIGNATURE-----
Version: 2.6

iQEVAwUAPnXZIvpL5ibJRTtBAQGVwAf/au1sM9BrZAASnWgs5mXgh/cAEvrAvqP9
GkPrsArSRAN6n2wDQm9NVQHbWHO6U3Mx8OeUq2OZlFtF5EDPwB+Dvzux6Lv64Ym+
wSs/T3F5DB4C0o+59V5+w3YCZe8HHDQwDdmLiORdgplJ+TVO+djz+YtCT/F6x9/H
tl7w21YwZuUnxMMz5Q1KLC7PXwY07JXVbd0yGSIVfDqMpu3EBhXzmaVHN6pj0OJ5
M9O4tZECgF24KxruTT7giw50pKtSLkClRSelM7GeJ8Qyz/FxFxs8NP5oskKx7Oby
IBW9aV3NbsyaHEu0XobEI2G7Jk3STj/kcd6fkHHKqUjCs3h9UotBnA==
=d4sT
-----END PGP SIGNATURE-----




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ