|
Message-ID: <530EE0AD.30204@sysdream.com> Date: Thu, 27 Feb 2014 07:52:29 +0100 From: Damien Cauquil <d.cauquil@...dream.com> To: oss-security@...ts.openwall.com Subject: CVE request: PLOGGER 1.0RC1 multiple vulnerabilities We found two vulnerabilities in PLOGGER version 1.0RC1, including: 1. Authenticated Arbitrary file upload vulnerability affecting PLOGGER version 1.0RC1 This vulnerability allows an authenticated user to upload an arbitrary PHP file on the remote web server in an accessible path, by sending a specifically crafted zip file. 2. CAPTCHA bypass vulnerability A theme called "Lucid" provided in PLOGGER version 1.0RC1 implements a weak CAPTCHA prone to a replay attack. By abusing this vulnerability, an unauthenticated user may be able to post a huge number of comments. Vendor was notified and answered this software is no more maintained. References: * advisory: http://www.sysdream.com/system/files/PLOGGER-1.0RC1-advisory.pdf * PLOGGER 1.0 RC1 release: http://www.plogger.org/ We would like to request 2 CVEs for these vulnerabilities. -- Damien Cauquil Directeur Recherche & DĂ©veloppement CHFI | CEH | ECSA | CEI Sysdream 108 avenue Gabriel PĂ©ri 93400 Saint Ouen Tel: +33 (0) 1 78 76 58 21 www.sysdream.com
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.