lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 21 Nov 2013 12:19:45 -0500
From: "steve jobs" <job.steve@...l.com>
To: "adam" <iarethebest@...il.com>
Cc: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk,
 support@...erva.com, sales@...erva.com
Subject: Re: Imperva WAF/DAF 9.5 patch8 and 10.0 patch 2
 localroot vulnerability

Imperva was holy shit in fact,the system was still running with the old and unsecure kernel.
----- Original Message -----
From: adam
Sent: 11/21/13 05:39 PM
To: steve jobs
Subject: Re: [Full-disclosure] Imperva WAF/DAF 9.5 patch8 and 10.0 patch 2 localroot vulnerability

Holy shit you guys, a ghost. 

On Wed, Nov 20, 2013 at 9:12 AM, steve jobs < job.steve@...l.com > wrote:Imperva use hardened centos 5.4 to run Web Application Firewall and Database Activity Monitoring product.
It could be exploit to get root in the kernel 2.6.18-164.15.1.el5.imp4 which was built by imperva in 9.5 patch 8 and 10.0 patch 2.
I hope imperva could upgrade your OS to centos 5.9 with kernel 2.6.18-348 to keep your system secure.
Your can check the attachment for details.

[test95p8@...AF ~]$ uname -a
Linux GFWAF 2.6.18-164.15.1.el5.imp4 #1 SMP Mon Apr 8 15:29:20 IDT 2013 x86_64 x86_64 x86_64 GNU/Linux
[test95p8@...AF ~]$ cat /etc/redhat-release
Imperva release 5.4 (Final)
[test95p8@...AF ~]$ wc -l /etc/shadow
wc: /etc/shadow: Permission denied
[test95p8@...AF ~]$ id
uid=505(test95p8) gid=507(test95p8) groups=507(test95p8)
[test95p8@...AF ~]$ ./centos54_localroot_exp
########snip##############
sh-3.2# id
uid=0(root) gid=507(test95p8) groups=507(test95p8)
sh-3.2# wc -l /etc/shadow
40 /etc/shadow
sh-3.2#

[root@WAF ~]# impctl platform show 2> /dev/null | grep version
version 10.0.0.2_0
[root@WAF ~]# uname -a
Linux WAF 2.6.18-164.15.1.el5.imp4 #1 SMP Mon Apr 8 15:29:20 IDT 2013 x86_64 x86_64 x86_64 GNU/Linux
[root@WAF ~]# cat /etc/redhat-release
Imperva release 5.4 (Final)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html 
Hosted and sponsored by Secunia - http://secunia.com/

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ