Site: www.tcs.com (Tata Consultancy Services)
Multiple SQL Injection/XSS bugs
Risk: Medium-High
The company which can't secure it's site is providing services on Security. WOW !!!
http://www.tcs.com/esecurity => Check this out ;)
SQL Injection - Do you want me to be the DBA ;) ??
Cross Site Scripting - Do you see phishing coming your way ;) ??
I sent an email back in December 2006, they're so responsible not to fix their bugs even after 2 months. I sent the email to their Information Security Manager, Chennai, not to admin/webmaster/or any default address. No response until date (see picture)
Email sent to "Full-Disclosure - We believe in it ;)"
Cheers :)
Monday, February 26, 2007
Sunday, February 18, 2007
Posted to Full-Disclosure list, copied to LegionSec
Full-Disclosure - We believe in it
On a sidenote, this post got dugg !
Cheers :)
Full-Disclosure - We believe in it
On a sidenote, this post got dugg !
Cheers :)
Saturday, February 17, 2007
Update to my previous post :)
Possibility to fetch files such as /etc/passwd
http://www.flconferences.com/download.php?file=/legionsec_1/archive/LegionSec'06___Vicente.pdf => Example
Click on the above link to see "Function.fopen"
When it lists out "fopen(/hsphere/local/home/flconf/flconferences.com/user_conference/legionsec_1/archive/LegionSec\'06___Vicente.pdf"
What amount of time will it take for an attacker, to manipulate this function and retrieve critical files as /etc/passwd or /etc/shadow
With this kind of information in hand, the extent of damage that can be done is "maximum"
Documentation for Function.fopen from PHP Website.
Full-Disclosure - We believe in it.
Cheers :)
Subscribe to:
Posts (Atom)