Floragasse 7 – 5th floor, 1040 Vienna
Subscribe to our Newsletter

SBA Research is a research center for Information Security
funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.

Tag: Security Advisory

SBA Security Advisory – Ping Identity Agentless Integration Kit – Reflected Cross-site Scripting (XSS) (CVE-2019-13564)

Ping Identity Agentless Integration Kit before 1.5 is susceptible to Reflected Cross-site Scripting at the /as/authorization.oauth2 endpoint due to improper encoding of an arbitrarily submitted HTTP GET parameter name. We recommend to update Ping Identity Agentless Integration Kit to version 1.5 or later. For further details, see the full security advisory. Read More
SBA Security Advisory – Ping Identity Agentless Integration Kit – Reflected Cross-site Scripting (XSS) (CVE-2019-13564)

SBA Security Advisory – Teltonika RUT9XX – Missing Access Control to UART Root Terminal (CVE-2018-17534)

Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges. We recommend to update Teltonika RUT9XX routers to version RUT9XX_R_00.04.233 or later. For further details, see the full security advisory. Read More
SBA Security Advisory – Teltonika RUT9XX – Missing Access Control to UART Root Terminal (CVE-2018-17534)

SBA Security Advisory – Teltonika RUT9XX – Reflected Cross-Site Scripting (XSS) (CVE-2018-17532)

Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges. We recommend to update Teltonika RUT9XX routers to version RUT9XX_R_00.05.01.1 or later. For further details, see the full security advisory. Read More
SBA Security Advisory – Teltonika RUT9XX – Reflected Cross-Site Scripting (XSS) (CVE-2018-17532)

SBA Security Advisory – phpWhois – PHP Code Injection (CVE-2015-5243)

phpWhois and some of its forks in versions before 5.1.0 are prone to a code injection vulnerability due to insufficient sanitization of returned WHOIS data. This allows attackers controlling the WHOIS information of a requested domain to execute arbitrary PHP code in the context of the application. We recommend to update phpWhois to version jsmitty12: 5.1.0 or later. For further details, see the full security advisory. Read More
SBA Security Advisory – phpWhois – PHP Code Injection (CVE-2015-5243)

SBA Security Advisory – KNX management software ETS – remote code execution vulnerability (CVE-2015-8299)

The vulnerability is caused by a buffer overflow in a memcpy operation when parsing specailly crafted KNXnet/IP packets in the Group messages monitor (aka. Falcon). An according proof-of-concept exploit which was tested on an affected ETS version installed on a Windows XP SP3 can be found below. The proof-of-concept exploit generates the UDP packet which triggers the vulnerability and should at least crash the application (it requires python and scapy to run). Read More
SBA Security Advisory – KNX management software ETS – remote code execution vulnerability (CVE-2015-8299)