popper_mod 1.2.1 and previous accounts compromise

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



description: popper_mod is a free, full featured web based POP3 email client written in PHP. It is an extension of the now abandoned "popper" project. 
It can be downloaded from http://www.symatec-computer.com/forums/

bug report: popper_mod 1.2.1 relied on administrators using htaccess authentication to protect the administration PHP script.  Unfortunately, I have found no administrator yet who has protected their admin script access.  

exploit: simply go to http://www.targetdomain.com/mail/admin  
Your identity as administrator is not verified in anyway, and the complete list of user accounts including the passwords is revealed.  You can also delete accounts, manipulate settings, and modify accounts.

fix: popper_mod 1.2.2 and above require the administrator to log in with a username and password.  As of this advisory, latest version is 1.2.3 which can be downloaded from http://www.symatec-computer.com/forums/viewtopic.php?t=14





[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux