cwbe coordinatez:
101
63540
1701996
4658010

ABSOLUT
KYBERIA
permissions
you: r,
system: public
net: yes

neurons

stats|by_visit|by_K
source
tiamat
K|my_K|given_K
last
commanders
polls

total descendants::
total children::37
71 ❤️


show[ 2 | 3] flat


.maio0
lupus yonderboy0
e1m10
afross0
*0
lulco0
andread0
dno0
fefo0
wwwnick0
v920
potion0
Toth0
darmozrac0
zrnk☉0
fuz00
ddd0
daan0
Dafko0
fds0
Rion-E0
fk0
chess0
zoje0
Martir0
al-caid0
-sXero-0
huno0
zyn0
WooDy0
harso0
niekt00
||0
fifteen0
duBeN0
GAZ0
wintop0
dontbelight0
porkac0
maniac0
piece_of_IT0
jklmn0
techko0
coffee0
boltzmann brain0
xado0
Klabla1
bujak1
Ruza1
quaplo1
[347]1
visby1
kristinuocic...1
eyes wide open1
Martini1
Spacer1
femme1
rx1
drobna1
súdruh Kilián1
freezy1
robo1
kpt_chloroform2
mamba_the_black37
dark tao37
---===||| kyberia hack contest |||===---

O co ide:

Najst na kyberii co najviac zranitelnosti (bezpecnostnych chyb), predpoklada sa primarne zameranie na webowu cast, ale nie je to obmedzenie.

Pravidla:

-Za platny nalez bude povazovane prakticky vsetko z OWASP vulnerability listu , pripadne akakolvek ina dostatocne zavazna chyba. Najcastejsie budu pravdepodobne rozne formy XSS, CSRF, session fixation...

-Zucastnit sa moze ktokolvek (idealne s kontom na kyberii) a to od 21.4.2009 00:01 do 5.5.2009 23:59,

-Do contestu sa netreba nijak prihlasovat, staci do tohoto fora pridat najdeny bug.

-Vitazom sa stane clovek ktory najde najzavaznejsi bug, (pripadne vela zavaznych).

-Porota si vyhradzuje patent na rozum pri posudzovani zavaznosti.

-Povolene su iba "rucne" testy, a to hlavne kvoli vykonnostnej narocnosti (teda napr. paros alebo webscarab mozete pouzit, ale bez automatickych modulov).

-Prosime nesnazte sa aktivne o DOS (denial of service) utoky,su to tiez zavazne chyby, ale nie prilis zlucitelne s funkcnostou kyberie pre ostatnych.

-Vsetky najdene nalezy piste do tohoto fora, pocita sa iba prvy nalezca jedneho bugu. Ak by ste nasli prilis kriticku chybu (napr. sql injection, file include) je vhodne ju naprv. napisat mne do posty, aby mohla byt opravena pred zverejnenim.

-Za lubovolny zverejneny bug pocas sutaze nebude nikto vyhodeny z kyberie ani nijak popotahovany;) To plati aj pre nahodne zhodenie kyberie, systematicke cielene zhadzovanie ale nebude tolerovane.

-Pri zverejneni bugu prosim zverejnite aj postup, akym sa da zreprodukovat, aby ho bolo mozne overit.

Ceny:

Planujeme ocenit 3 najlepsich, a to pravdepodobne binarnou formou (konto na hysterii, pozvanka na session, ..), ale zatial to nie je finalne. Ak by vitaz uz tieto "benefity" mal, vymyslime nieco ine.

Otazky? Sem!

Objavene bugy ( 23 + 8;):
Objavitel / bugy

id 660 (miloo)
1: SQL injection v POSTe "event=configure_system_access&node_system_access=private',node_name=(select password from users where user_id=$ID_OBETE), node_id='$ID_UTOCNIKA" na "https://kyberia.sk/id/$ID_UTOCNIKA"
Utocnik takto mohol tahat lubovolne data z sql databazy rychlostou jeden string na 2 requesty. (FIXNUTE)
2: SQL injection v /id/19/ -> set_bookmark_category, v node_id. Dosah obdobny ako 1. (FIXNUTE)
3: SQL injection v delete mail. (cislo mazanej spravy nie je osetrene). (FIXNUTE)
4: SQL injection v event=K (node_chosen[] checkbox). (FIXNUTE)
5: PHP shell (data upload nekontroloval korektne priponu uploadnuteho fajlu => upload php)
6: Root shell (stary kernel & ...)

id 2244 (Xanthix )
1: Stored XSS v userinfo (FIXNUTE)

id 2913832 (k)
1: stored XSS v nodename (IE only) (FIXNUTE)
2: SQL injection v konfiguracii nody. V poliach silencelist, masterlist, executelist, banlist a oplist
nebol osetrovany apostrof na vstupe, a teda sa dali zneuzit na sql injection. Exploit nedodal. (FIXNUTE)
3: reflected XSS v mene usera (mail)
4: reflected XSS v archiv hladani
5: censored for now
6: censored for now

id 1859269 (Toth)
1: V user submissions children sa zobrazuju privatne nody
2: Do moderated nody sa da zapisat cez id/noda/4

id 1580092 (sine)
1: CSRF (pri zmene emailu)
2: reflected XSS v preview
3: reflected XSS v chat
4: reflected XSS pri registrácii (login aj email )
5: session fixation na cookie PHPSESSID
6. reflected XSS v search
7. stored XSS v ankete (FIXNUTE)
8. v configure v poliach silencelist, masterlist, executelist, banlist a oplist je aj reflected XSS
9. SQL injection v configure_external_access v node. Dopad rovnaky ako v sqli od id 660. Zaroven aj XSS. (FIXNUTE)
10. Takmer blind SQL injection v logine (cez id). Da sa ziskat jeden bit na 1 request. (teoreticky mozno aj viac) (FIXNUTE)
11. Stored XSS v poste, ked user posle mail sam sebe (vo vsetkych atributoch). Nie je to priamo zneuzitelne, ale da sa tak premenit reflected XSS na stored XSS.

id 956 (gnomon)
1: je mozne preparentovat prispevok do privatnej nody kam user nema pristup

id 1595477 (e1m1)
1: Local file include (directory traversal). Cez -> event=../../../../../../../../etc/passwd%00 (FIXNUTE)

id 3764244 (Harvie)
1: nodu s nastavenym net=false videt bez prihlasenia z parrent nody, ktora ma net=true
2: presna identifikacia v http headroch (napr PHP/5.2.0-8+etch13)

---------------------------------------------
Zatial najvaci prielom: Root shell;) (miloo)
Game over!;)


  submission:: :) :: NEW (2 children )   NEW DESCENDANT   (Toth)
  submission:: X :: NEW (0 children )   NEW DESCENDANT   (piece_of_IT)
  submission:: 01.05.2009-17:27:29 :: NEW (2 children )   NEW DESCENDANT   (mirex)
  submission:: 03.04.2010-21:31:16 :: NEW (1 children )   NEW DESCENDANT   (ch)
  submission:: 1. BUG :: NEW (1 children )   NEW DESCENDANT   (Toth)
  submission:: 2. BUG :: NEW (1 children )   NEW DESCENDANT   (Toth)
  submission:: 22.04.2009-8:39:18 :: NEW (1 children )   NEW DESCENDANT   (idecko)
  submission:: 23.04.2009-18:18:18 :: NEW (1 children )   NEW DESCENDANT   (Harvie)
  submission:: 23.07.2009-14:06:28 :: NEW (2 children )   NEW DESCENDANT   (andread)
  submission:: 24.04.2009-14:08:40 :: NEW (9 children )   NEW DESCENDANT  23 ❤️ (miloo)
  submission:: 24.04.2009-18:01:43 :: NEW (0 children )   NEW DESCENDANT   (e1m1)
  submission:: 24.04.2009-18:02:19 :: NEW (0 children )   NEW DESCENDANT   (e1m1)
  submission:: 24.04.2009-18:03:31 :: NEW (0 children )   NEW DESCENDANT   (e1m1)
  submission:: 25.04.2009-13:44:02 :: NEW (3 children )   NEW DESCENDANT   (femme)
  submission:: 3. BUG :: NEW (1 children )   NEW DESCENDANT   (Toth)
  submission:: co to tam robi? :: NEW (1 children )   NEW DESCENDANT   (Toth)
  submission:: directory traversal:) :: NEW (4 children )   NEW DESCENDANT  17 ❤️ (e1m1)
  submission:: identifikace :: NEW (0 children )   NEW DESCENDANT   (Harvie)
  submission:: IP address tracing PoC aneb odhaľ svoju ájpíčku: Mission Accomplished :: NEW (4 children )   NEW DESCENDANT   (piece_of_IT)
  submission:: magic_quotes_gpc :: NEW (1 children )   NEW DESCENDANT   (Harvie)
  submission:: namietka, alebo .. opravte ma, ak sa mylim :: NEW (1 children )   NEW DESCENDANT   (sine)
  submission:: refl. xss mail a archiv :: NEW (2 children )   NEW DESCENDANT   (k_[uz_vsetko_viem])
  submission:: screwed preview :: NEW (0 children )   NEW DESCENDANT   (Harvie)
  submission:: test1 :: NEW (1 children )   NEW DESCENDANT   (niekt0)
  submission:: vyhodnotenie hack contestu :: NEW (9 children )   NEW DESCENDANT  77 ❤️ (niekt0)
  link:: samanizmus v 21. storoci - Cesta poznania ::   NEW LINK (*amanita*)
  link:: smart drugs a nootropika ::   NEW LINK (X89)


There are currently 9913 K available in
2nd Guild's K-treasury.




get 1 🦆 for 5 🐘
get 1 🐘 for 1 🦆




dendrite smart drugs a nootropika
dendrite samanizmus v 21. storoci - Cesta poznania
axone main