Re: IMail Account hijack through the Web Interface

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This (among other things in IMail v. 7.04 and earlier) was reported to 
Bugtraq by Niels Heinen (zilli0n@gmx.net) on the 12th of October last year. 
The only difference is that this post reports that v. 7.05 is also 
vulnerable (if not patched).

http://online.securityfocus.com/archive/1/219970

On 21:37 2002-03-10 +0100 Obscure wrote:
>Advisory Title: IMail Account hijack through the Web Interface
>Release Date: 10/03/2002
>Application: IMail Server
>
>Platform: Windows NT4
>           Windows 2000
>           Windows XP
>
>Version: 7.05 or earlier
>
>Severity: Malicious users can easily access other people's accounts.
>
>Author: Obscure^ [ obscure@eyeonsecurity.net ]
>
>Vendor Status: Informed on 21 Feb 2002, a fix was already issued to
>customers.
>
>
>Web:
>
>http://www.eyeonsecurity.net
>http://www.ipswitch.com
>
>
>
>Background.
>
>(extracted from
>http://www.ipswitch.com/Products/IMail_Server/index.html)
>
>The 20-Minute E-Mail Solution.
>IMail Server is an easy-to-use, web-enabled, secure and
>spam-resistant
>mail server for Windows NT/2000/XP. It is the choice
>of businesses, schools, and service providers.
>
>A Great Price-Performer.
>Unlike Microsoft® Exchange and Lotus® Notes, which are costly to
>deploy and cumbersome to administer, IMail Server is easy
>to install and easy to manage. It has a simple pricing structure and
>is scalable to thousands of users per server.
>
>
>Problem.
>
>When a user logs in to his account through the Web interface, the
>session authentication is maintained via a unique URL.
>By sending an html e-mail which includes an image at another server,
>an attacker can easily get the unique URL via the
>referer field in the HTTP header.
>
>
>Exploit Example.
>
>http://eyeonsecurity.net/tools/referer.html
>A CGI script sends an e-mail with an attached image, pointing to
>another CGI script which sends the referer URL to the
>attacker.
>
>
>Fix
>
>Upgrade to IMail 7.06. The fixed version checks for the IP. The
>authentication now relies on the unique URL and the IP
>address. Of course users who log in to IMail Web interface from
>behind
>proxies, are still vulnerable.
>
>
>ps. this same vulnerability effects Excite WebMail. The Excite guys
>did not contact me back.
>
>
>Disclaimer.
>
>The information within this document may change without notice. Use
>of
>this information constitutes acceptance for use in an AS IS
>condition. There are NO warranties with regard to this information.
>In no event shall the author be liable for any consequences
>whatsoever
>arising out of or in connection with the use or spread of this
>information. Any use of this information lays within the user's
>responsibility.
>
>
>Feedback.
>
>Please send suggestions, updates, and comments to:
>
>Eye on Security
>mail :   obscure@eyeonsecurity.net
>web  :   http://www.eyeonsecurity.net


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux