Endymion SakeMail and MailMan File Disclosure Vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





hola,

Endymion´s (http://www.endymion.com) Sakemail and
Mailman have a classic file-disclosre vulnerability
(details attached).


nice day,

rC














security@freefly.com
rudicarell@hotmail.com

http://www.websec.org





_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp.
Product:

Mailman - Webmailsystem (http://www.endymion.com)

Problem Description:

due to missing input-validation it is possible to read files with the 
webservers (or mailmans) permissions
a similar (pretty much the same) bug was discovered 2 years ago from 
"secureality" 
(http://www.securereality.com.au/)/(http://online.securityfocus.com/archive/1/149214).


Example:

a HTTP-request to:
http://hostname/cgi-bin/mmstdo*.cgi
with the following parameters:
USERNAME=
PASSWORD=
ALTERNATE_TEMPLATES= [relative FILE/PATH] [Nullbyte/0x00]

... will lead to disclosure of [FILE/PATH]




Summary:

object: mmstdo*.cgi (Perl Script)

class: Reffering to OWASP-IV (Input Validation Classes)

Directory Traversal (IV-DT-1) 
http://www.owasp.org/projects/cov/owasp-iv-dt-1.htm
Null Character (IV-NC-1) http://www.owasp.org/projects/cov/owasp-iv-nc-1.htm

remote: yes
local: ---
severity: medium

vendor: hast been informed [got a ticket# from some automated reply .. but 
nothing else]
patch/fix: ???
recomannded fix: sanitize meta-characters from user-input




security@freefly.com
rudicarell@hotmail.com
http://www.websec.org

check out the Open Web Application Security project
http://www.owasp.org
Product:

SakeMail - Webmailsystem (http://www.endymion.com)

Problem Description:

due to missing input-validation it is possible to read xml/other files with 
sakemails permissions
read THIS (javanullbyte.html) for additional infos on nullbytes and 
java-classes!

Example:

a HTTP-request to:
http://hostname/com.endymion.sake.servlet.mail.MailServlet
with the following parameters:

cmd_help=1
param_name= [relative FILE/PATH] [Nullbyte/0x00]


... will lead to disclosure of [FILE/PATH]


Remark:
for some strange reason the used xml-parser for windows bahaves different. 
the unix-version let you read any file, while the windows version allows 
only "xml-style" files to be read.

if the system authenticates agains mysql or mssql it is very likely to find 
database-usernames and passwords within general.ini or mail.ini

config-files with sensitive information:

mail.ini (db-usernames and passwords)
generali.ini
mssqlserver.sql
mysql.sql


Summary:

vendor: Endymion (http://www.endymion.com)
system: SakeMail (all versions) object: 
com.endymion.sake.servlet.mail.MailServlet(maybe others)

class: Reffering to OWASP-IV (Input Validation Classes)

Directory Traversal (IV-DT-1) Null Character (IV-NC-1)
remote: yes
local: ---
severity: medium-high

vendor: hast been informed ( got a ticket# from some automated replay .. but 
nothing else )
patch/fix:
recomannded fix: sanitize meta-characters from user-input




@2002 Martin Eiszner
security@freefly.com
http://www.websec.org

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux