blog.lesis.lat

Recent Posts

November 07, 2024

Analysis of CVE-2016-10045: RCE in PHPMailer

CVE-2016-10045[1] is a critical vulnerability in PHPMailer[2], a widely used library for sending emails in PHP[3] web applications, affecting versions prior to 5.2.18. This vulnerability allows attackers to execute malicious code on a compromised web server by exploiting an input validation flaw in the PHPMailer code.

November 07, 2024

Analysis of CVE-2016-1000226: XSS in Swagger-UI

CVE-2016-1000226[1] is a cross-site scripting (XSS)[2] vulnerability in Swagger-UI[3], disclosed on July 21, 2016, affecting versions prior to 2.2.2. This vulnerability allows an attacker to inject malicious scripts into API input parameters and within its Swagger JSON document generation.

November 06, 2024

Análise da CVE-2016-10045: RCE no PHPMailer

A CVE-2016-10045[1] é uma vulnerabilidade crítica no PHPMailer[2], que afeta versões anteriores à 5.2.18, uma biblioteca amplamente utilizada para o envio de e-mails em aplicações escritas em PHP[3]. Essa vulnerabilidade permite que um atacante execute códigos maliciosos em um servidor web comprometido, explorando uma falha de validação de entrada no código do PHPMailer.

November 06, 2024

Análise da CVE-2016-1000226: XSS no Swagger-UI

A CVE-2016-1000226[1] se trata de uma vulnerabilidade de cross-site scripting (XSS)[2] no Swagger-UI[3]. A vulnerabilidade foi divulgada em 21 de julho de 2016 e afeta as versões anteriores à 2.2.2 do Swagger-UI. A vulnerabilidade permite que um atacante injete scripts maliciosos nos parâmetros de entrada de uma determinada API e na geração de seus documentos JSON Swagger.

November 01, 2024

Analysis of CVE-2006-3392: path traversal in Webmin

CVE-2006-3392[1] is a path traversal vulnerability[3] identified in Webmin[2], a web-based configuration system for Unix-like systems, affecting versions prior to 1.290. This vulnerability arises because the `simplify_path` function is invoked before HTML decoding. By crafting a sequence of bytes such as “..%01”, an attacker can bypass the removal of “../” sequences to the left of certain bytes (e.g., “%01”), enabling unauthenticated and unauthorized access to the contents of internal server files. The vulnerability was published by Kenny Chen on June 30, 2006.