FOG is a free, open source, computer cloning and management solution.
We found several vulnerabilities in Fog, a free and open source computer cloning and management solution : a SQL injection (CVSS 9.3) and an unauthenticated remote command execution vulnerability (CVSS 10).
As a solution, the vendor recommends using the beta/development builds, instead of the 1.2.0 stable release.

Lire la suite


Several XSS vulnerabilities have been found on several pages of the administration panel. Reflected XSS may lead to session hijacking on admin user.

Several vulnerabilities have been discovered between 2015, October and 2016, February.
Reported vulnerabilities are similar to those previously discovered by hyp3rlinx, although they concern different pages.
In brief, the flaws are of the following kinds: CSRF, XSS (reflected and stored), file upload and information disclosure. Most vulnerabilities need an administration access to the web application and may lead to personal information leakage or account take-over.

Lire la suite


Horsys is a human resource appliation, allowing the user to manage his profile, vacation, position title and other personnal data like address, phone number and so on.
The application runs on Windows and launches a web server. This product has been developped by Asys company.
We found that it is vulnerable to several vulnerabilities, which can lead to personal information leakage or account take-over.

Lire la suite



A vulnerability has been found in iThemes Security backup function that may allow attackers to gain access to backup/log files.

By default, when using the "database backup on filesystem" feature, iThemes Security saves the backup files in a world-readable directory :
wp-content/uploads/ithemes-security/backups

The .htaccess file is generated during the plugin initial setup/update, only if the wp-content/uploads/ithemes-security/backups exists (or wp-content/uploads/ithemes-security/logs). Note that it does NOT exists by default.

When running a backup, the ITSEC_Backup class creates the directory but without any .htaccess file inside. The same thing happens with log saving.

If the webserver has directory listing enabled, then anybody can download the complete database backup or view the log files.

Lire la suite






Les serrures connectées sont apparues il y a quelques années, surfant sur la vague de l'Internet des objets (IoT) avec pour ambition de remplacer nos serrures mécaniques traditionnelles. Ces serrures intègrent pour la grande majorité une connectivité Bluetooth et/ou NFC, afin de permettre aux utilisateurs de communiquer avec ces dernières et de les actionner à l'aide de clefs numériques. C'est tout naturellement que le Labo Sysdream s'est intéressé à ces différentes solutions, afin d'évaluer leur sécurité et d'éprouver des mécanismes d'attaques sur les objets connectés en général.

Lire la suite