* Posts by Daniel Hildebrandt

1 post • joined 20 Sep 2007

Web host breach may have exposed passwords for 6,000 clients

Daniel Hildebrandt

Secunia Vulnerbilities Status Summary

Okay, here's the list of all seven of the Secunia vulnerabilities listed as Cerberus Helpdesk ( http://secunia.com/search/?search=cerberus -- Cerberus FTP Server is a different company and product), and what I've found out about them:

http://secunia.com/advisories/15641/ is 2.x only. I have confirmed that the vulnerability is not in current code.

http://secunia.com/advisories/17431/ is 2.x only. The 3.x attachment_send.php requires the correct thread_id to go with the file_id, and that combination would be difficult (though not impossible) to guess, since the thread_id is only ever exposed in tickets to which the user already has access. I've added a check to make sure that only a logged in user can access attachment_send.php.

http://secunia.com/advisories/18112/ is reported against 2.x, but some of the SQL injections had not been fixed. The XSS reported is not reproducible in 3.x. The SQL injections reported that had not previously been fixed have now been fixed.

http://secunia.com/advisories/18657/ is 2.x only. I have confirmed that the vulnerability is not in current code.

http://secunia.com/advisories/21706/ is 2.x and 3.x, but it was fixed in 3.2.

http://secunia.com/advisories/22418/ is 3.x, but was fixed in October of '06.

http://secunia.com/advisories/23193/ is 2.x and 3.x. The vulnerability is listed against spellwin.php, but spellcheck.php has the same problem. This is still (theoretically) present and might work if register_globals is on and the Moon is in the proper alignment with Mars, but I couldn't get them to pop up on my dev machine...

The fixes made today will be pushed to our public CVS repository ( http://cerberusweb.com/cvsweb.pl ) shortly.

-Hildy, Cerberus Helpdesk Developer

WebGroup Media LLC