ID

VAR-200910-0132


CVE

CVE-2009-3647


TITLE

YABSoft Mega File Hosting Script of emaullinks.php Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2009-006417

DESCRIPTION

Cross-site scripting (XSS) vulnerability in emaullinks.php in YABSoft Mega File Hosting Script (aka MFH or MFHS) 1.2 allows remote attackers to inject arbitrary web script or HTML via the moudi parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NaviCOPA Web Server is a web server installed on a Windows system that automatically configures HTTP access. If a remote attacker submits a long HTTP GET request to the NaviCOPA Web Server, it can trigger a heap overflow, causing arbitrary code execution; in addition, submitting a specially crafted HTTP request containing a dot character to the server can also reveal the source code of the PHP script. NaviCOPA Web Server is prone to a remote buffer-overflow vulnerability and an information-disclosure vulnerability because the application fails to properly bounds-check or validate user-supplied input. Successful exploits of the buffer-overflow issue may lead to the execution of arbitrary code in the context of the application or to denial-of-service conditions. Also, attackers can exploit the information-disclosure issue to retrieve arbitrary source code in the context of the webserver process. Information harvested may aid in further attacks. This may let the attacker steal cookie-based authentication credentials and launch other attacks. ---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: NaviCOPA Script Source Disclosure and Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA33766 VERIFY ADVISORY: http://secunia.com/advisories/33766/ CRITICAL: Highly critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote SOFTWARE: NaviCOPA 3.x http://secunia.com/advisories/product/21322/ DESCRIPTION: e.wiZz! has discovered two vulnerabilities in NaviCOPA, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. 1) A boundary error in the processing of HTTP requests can be exploited to cause a heap-based buffer overflow via an overly long HTTP GET request. PHP scripts via specially crafted requests containing e.g. dot characters. The vulnerabilities are confirmed in version 3.01. SOLUTION: Restrict access to trusted users only. PROVIDED AND/OR DISCOVERED BY: e.wiZz! ORIGINAL ADVISORY: http://milw0rm.com/exploits/7966 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2009-3647 // JVNDB: JVNDB-2009-006417 // CNVD: CNVD-2009-0590 // BID: 33585 // BID: 36413 // PACKETSTORM: 74658

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2009-0590

AFFECTED PRODUCTS

vendor:yabsoftmodel:mega file hosting scriptscope:eqversion:1.2

Trust: 2.7

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:intervationsmodel:navicopa web serverscope:eqversion:3.01

Trust: 0.3

sources: CNVD: CNVD-2009-0590 // BID: 33585 // BID: 36413 // JVNDB: JVNDB-2009-006417 // CNNVD: CNNVD-200910-169 // NVD: CVE-2009-3647

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-3647
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-3647
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2009-0590
value: HIGH

Trust: 0.6

CNNVD: CNNVD-200910-169
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2009-3647
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2009-0590
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2009-0590 // JVNDB: JVNDB-2009-006417 // CNNVD: CNNVD-200910-169 // NVD: CVE-2009-3647

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2009-006417 // NVD: CVE-2009-3647

THREAT TYPE

network

Trust: 0.6

sources: BID: 33585 // BID: 36413

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-200910-169

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-006417

PATCH

title:Mega File Hosting Scripturl:http://yabsoft.com/mfhs-feature.php

Trust: 0.8

sources: JVNDB: JVNDB-2009-006417

EXTERNAL IDS

db:NVDid:CVE-2009-3647

Trust: 2.4

db:SECUNIAid:33766

Trust: 1.4

db:BIDid:36413

Trust: 1.3

db:BIDid:33585

Trust: 0.9

db:JVNDBid:JVNDB-2009-006417

Trust: 0.8

db:CNVDid:CNVD-2009-0590

Trust: 0.6

db:MILW0RMid:9694

Trust: 0.6

db:EXPLOIT-DBid:9694

Trust: 0.6

db:XFid:53278

Trust: 0.6

db:OSVDBid:58386

Trust: 0.6

db:CNNVDid:CNNVD-200910-169

Trust: 0.6

db:EXPLOIT-DBid:7966

Trust: 0.1

db:PACKETSTORMid:74658

Trust: 0.1

sources: CNVD: CNVD-2009-0590 // BID: 33585 // BID: 36413 // JVNDB: JVNDB-2009-006417 // PACKETSTORM: 74658 // CNNVD: CNNVD-200910-169 // NVD: CVE-2009-3647

REFERENCES

url:http://www.securityfocus.com/bid/36413

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/53642

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3647

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3647

Trust: 0.8

url:http://secunia.com/advisories/33766/

Trust: 0.7

url:http://xforce.iss.net/xforce/xfdb/53278

Trust: 0.6

url:http://www.osvdb.org/58386

Trust: 0.6

url:http://www.milw0rm.com/exploits/9694

Trust: 0.6

url:http://secunia.com/advisories/33766

Trust: 0.6

url:http://www.navicopa.com/

Trust: 0.3

url:/archive/1/500626

Trust: 0.3

url:http://www.hotscripts.com/listing/mega-file-hosting-script-v1-2/

Trust: 0.3

url:http://secunia.com/advisories/product/21322/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://milw0rm.com/exploits/7966

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2009-0590 // BID: 33585 // BID: 36413 // JVNDB: JVNDB-2009-006417 // PACKETSTORM: 74658 // CNNVD: CNNVD-200910-169 // NVD: CVE-2009-3647

CREDITS

Moudi

Trust: 0.9

sources: BID: 36413 // CNNVD: CNNVD-200910-169

SOURCES

db:CNVDid:CNVD-2009-0590
db:BIDid:33585
db:BIDid:36413
db:JVNDBid:JVNDB-2009-006417
db:PACKETSTORMid:74658
db:CNNVDid:CNNVD-200910-169
db:NVDid:CVE-2009-3647

LAST UPDATE DATE

2025-04-10T23:05:00.865000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2009-0590date:2014-01-27T00:00:00
db:BIDid:33585date:2009-08-25T00:52:00
db:BIDid:36413date:2009-09-16T20:30:00
db:JVNDBid:JVNDB-2009-006417date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200910-169date:2009-10-12T00:00:00
db:NVDid:CVE-2009-3647date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CNVDid:CNVD-2009-0590date:2009-02-03T00:00:00
db:BIDid:33585date:2009-02-03T00:00:00
db:BIDid:36413date:2009-09-16T00:00:00
db:JVNDBid:JVNDB-2009-006417date:2012-12-20T00:00:00
db:PACKETSTORMid:74658date:2009-02-04T15:44:25
db:CNNVDid:CNNVD-200910-169date:2009-10-09T00:00:00
db:NVDid:CVE-2009-3647date:2009-10-09T14:30:00.407