TA-2003-06 php-form-misconfiguration in VisNetic WebMail v.5.8.6.6

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



TA-2003-06 php-form-misconfiguration in VisNetic WebMail v.5.8.6.6
contributed by: rushjo
=========================================================================
Tripbit Security Advisory

TA-2003-06 php-form-misconfiguration in VisNetic WebMail v.5.8.6.6
=========================================================================


PROGRAM: VisNetic WebMail v.5.8.6.6 HOMEPAGE: http://www.deerfield.com VULNERABLE VERSIONS: v.5.8.6.6 RISK: Medium IMPACT: Unauthorized file viewing RELEASE DATE: 2003-06


========================================================================= TABLE OF CONTENTS =========================================================================


1.............................................................DESCRIPTION 2.................................................................DETAILS 3...............................................................SOLUTIONS 4...........................................................VENDOR STATUS 5.................................................................CREDITS 6..............................................................DISCLAIMER 7..............................................................REFERENCES 8................................................................FEEDBACK


1. DESCRIPTION =========================================================================

VisNetic MailServer: a multi-threaded, multiprocessor capable mail
server that supports the most widely used mail protocols including SMTP,
POP3, IMAP4, (including ACL) and LDAP. Each of these protocols can be
secured using SSL/TLS and it can accommodate unlimited domains and
accounts with built-in support for the VisNetic AntiVirus Plug-in.

VisNetic WebMail: a web-based mail system providing access to e-mail
using any web browser from


2. DETAILS =========================================================================

There exists a bug in the VisNetic WebMail, which can be exploit to see
the php source code of any file, by adding a "dot" behing the to viewing
site.

Example:

http://host:32000/mail/admin/../include.html.
http://host:32000/mail/admin/../settings.html.


3. SOLUTIONS =========================================================================

No solution for the moment.


4. VENDOR STATUS =========================================================================

The vendor has reportedly been notified and is working on an solution.


5. CREDITS =========================================================================

Discovered by posidron


6. DISLAIMER =========================================================================

The information within this paper may change without notice. Use of
this information constitutes acceptance for use in an AS IS condition.
There are NO warranties with regard to this information. In no event
shall the author be liable for any damages whatsoever arising out of
or in connection with the use or spread of this information. Any use
of this information is at the user's own risk.


7. REFERENCES =========================================================================

http://www.tripbit.org


8. FEEDBACK =========================================================================

Please send suggestions, updates, and comments to:


Tripbit Security Advisory


Site: http://www.tripbit.org
Mail: rushjo@tripbit.org
      posidron@tripbit.org
      tec@tripbit.org




[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux