Kupiłem lampę insektobójczą Blaupunkt BP-GIK04. I to był błąd. LED INSECT KILLER BP-GIK04 z LED łączy tylko nazwa. Urządzenie wyposażone jest w świetlówkę kompaktową UV. Wyprodukowane zostało w PRC z kilku kawałków tworzywa sztucznego oraz kliku niezbyt solidnie połączonych kabelków. Niestety nie działało. Za pierwszym razem, w dostarczonym urządzeniu działał tylko wentylator. Zostało ono wymienione przez sprzedawcę na kolejne, równie niedziałające urządzenie. W drugim egzemplarzu nie działała ani świetlówka, ani wentylator.
diag_tool.cgi on DASAN H660RM devices with firmware 1.03-0022 allows spawning ping processes without any authorization leading to device enumeration on LAN interface and DoS attacks against both device and network.
CWE-862: Missing Authorization weakness in diag_tool.cgi allows remote attacker to spawn ping (and traceroute) processes on affected devices without authorization. Moreover similar bug in diag_get_result.cgi allows attacker to retrieve command output. Arbitrary command injection using ; or ` (back ticks) does not seems to work (which make this different than CVE-2018-10561 and CVE-2018-17869).
This vulnerability was assigned CVE-2019-9974.
Boa Webserver on DASAN H660RM devices with firmware 1.03-0022 (and possibly other) saves post data, including credentials, to /tmp/boa-temp. Moreover this file is not sanitized after request has been processed, which allow retrieval of login credential possible until another POST request is made.
This vulnerability was assigned CVE-2019-9976.
DASAN H660RM devices with firmware 1.03-0022 (and possibly other) uses a hard-coded key “dasanektks123” for logs encryption. Data stored using this key can be decrypted by anyone able to access this key.
This vulnerability was assigned CVE-2019-9975.
DASAN H665 has vendor backdoor built into BusyBox /bin/login. Account named “dnsekakf2$$” gives access to admin (uid 0) account over telnet, at least for administration interface documented in H665 QIG (Quick Guide).
DASAN H665 is GPON Optical Network Terminal (ONT). It could work as router/NAT or bridge and allow End User to Web Access device at http://192.168.55.1/. Depending on device’s configuration it might assign different 192.168.X.0/24 subnet over DHCP, but device still reply to traffic on 192.168.55.1 from any devices in 192.168.55.0/24 subnet.
This vulnerability was assigned CVE-2019-8950.
New version of ESE Key Daemon was released today.
New features include the ability to handle multiple key combinations and distinguish between key presses and releases. A problem with the handling of the last line in a configuration file when there is no newline on the last line is gone. Numeric keys are now also allowed in the configuration file.
nCipher’s installation guide is quite good, but after you finish installing hardware, drivers and daemons, you are on your own.
Both guides ends on key generation and self-signed certificates. Its enough to get CHIL enabled application to work with nCipher’s HSM, but will not help you to convert any existing OpenSSL (not an CHIL-aware) application to use HSM.
Routing messages from one input queue to two output queues in ActiveMQ can be done in two different ways. Apache Camel, a powerful rule-based routing engine often used with ActiveMQ, is a typical choice. Virtual composite queue is another solution. Which to choose? The faster.