ezmlm warning

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi! This is the ezmlm program. I'm managing the
bugtraq@xxxxxxxxxxxxxxxxx mailing list.

I'm working for my owner, who can be reached
at bugtraq-owner@xxxxxxxxxxxxxxxxx.

Messages to you from the bugtraq mailing list seem to
have been bouncing. I've attached a copy of the first bounce
message I received.

If this message bounces too, I will send you a probe. If the probe bounces,
I will remove your address from the bugtraq mailing list,
without further notice.

I've kept a list of which messages from the bugtraq mailing list have 
bounced from your address.

Copies of these messages may be in the archive.

To retrieve a set of messages 123-145 (a maximum of 100 per request),
send an empty message to:
   <bugtraq-get.123_145@xxxxxxxxxxxxxxxxx>

To receive a subject and author list for the last 100 or so messages,
send an empty message to:
   <bugtraq-index@xxxxxxxxxxxxxxxxx>

Here are the message numbers:

   47393
   47394
   47395
   47396
   47397
   47398
   47399
   47400
   47401
--- Enclosed is a copy of the bounce message I received.
Return-Path: <>
Received: (qmail 30770 invoked from network); 29 Jul 2011 14:49:43 -0000
Received: from unknown (HELO mail.securityfocus.com) (192.168.120.35)
  by lists.securityfocus.com with SMTP; 29 Jul 2011 14:49:43 -0000
Received: (qmail 8842 invoked by alias); 29 Jul 2011 14:49:33 -0000
Received: (qmail 19916 invoked from network); 29 Jul 2011 14:48:18 -0000
Received: from unknown (HELO sf01smtp2.securityfocus.com) (192.168.120.34)
  by mail.securityfocus.com with SMTP; 29 Jul 2011 14:48:18 -0000
Received: by sf01smtp2.securityfocus.com (Postfix)
	id AC00280B06; Fri, 29 Jul 2011 07:59:34 -0700 (PDT)
Date: Fri, 29 Jul 2011 07:59:34 -0700 (PDT)
From: MAILER-DAEMON@xxxxxxxxxxxxxxxxx (Mail Delivery System)
Subject: Undelivered Mail Returned to Sender
To: bugtraq-return-47393-list-bugtraq23=spinics.net@xxxxxxxxxxxxxxxxx
Auto-Submitted: auto-replied
MIME-Version: 1.0
Content-Type: multipart/report; report-type=delivery-status;
	boundary="91D1980998.1311951557/sf01smtp2.securityfocus.com"
Message-Id: <20110729145934.AC00280B06@xxxxxxxxxxxxxxxxxxxxxxxxxxx>

This is a MIME-encapsulated message.

--91D1980998.1311951557/sf01smtp2.securityfocus.com
Content-Description: Notification
Content-Type: text/plain; charset=us-ascii

This is the mail system at host sf01smtp2.securityfocus.com.

I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.

For further assistance, please send mail to <postmaster>

If you do so, please include this problem report. You can
delete your own text from the attached returned message.

                   The mail system

<list-bugtraq23@xxxxxxxxxxx>: host mail.spinics.net[68.183.106.108] said: 550
    5.7.1 Rejected: 143.127.139.113 listed at zen.spamhaus.org (in reply to
    MAIL FROM command)

--91D1980998.1311951557/sf01smtp2.securityfocus.com
Content-Description: Delivery report
Content-Type: message/delivery-status

Reporting-MTA: dns; sf01smtp2.securityfocus.com
X-Postfix-Queue-ID: 91D1980998
X-Postfix-Sender: rfc822; bugtraq-return-47393@xxxxxxxxxxxxxxxxx
Arrival-Date: Fri, 29 Jul 2011 07:36:23 -0700 (PDT)

Final-Recipient: rfc822; list-bugtraq23@xxxxxxxxxxx
Action: failed
Status: 5.7.1
Remote-MTA: dns; mail.spinics.net
Diagnostic-Code: smtp; 550 5.7.1 Rejected: 143.127.139.113 listed at
    zen.spamhaus.org

--91D1980998.1311951557/sf01smtp2.securityfocus.com
Content-Description: Undelivered Message
Content-Type: message/rfc822

Received: from lists.securityfocus.com (lists.securityfocus.com [192.168.120.36])
	by sf01smtp2.securityfocus.com (Postfix) with QMQP
	id 91D1980998; Fri, 29 Jul 2011 07:36:23 -0700 (PDT)
Mailing-List: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@xxxxxxxxxxxxxxxxx>
List-Help: <mailto:bugtraq-help@xxxxxxxxxxxxxxxxx>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@xxxxxxxxxxxxxxxxx>
List-Subscribe: <mailto:bugtraq-subscribe@xxxxxxxxxxxxxxxxx>
Delivered-To: mailing list bugtraq@xxxxxxxxxxxxxxxxx
Delivered-To: moderator for bugtraq@xxxxxxxxxxxxxxxxx
Received: (qmail 23430 invoked from network); 28 Jul 2011 21:52:54 -0000
X-AuditID: c0a87820-b7c78ae000007561-66-4e31dc774180
From: Tom Neaves <tom@xxxxxxxxxxxxx>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Subject: Sitecore CMS 6.4 Open URL Redirect Vulnerability
Date: Thu, 28 Jul 2011 23:02:38 +0100
Message-Id: <464F030F-31DF-46F0-B857-07FC3A530977@xxxxxxxxxxxxx>
To: bugtraq@xxxxxxxxxxxxxxxxx, full-disclosure@xxxxxxxxxxxxxxxxx
Mime-Version: 1.0 (Apple Message framework v1244.3)
X-Mailer: Apple Mail (2.1244.3)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrKIsWRWlGSWpSXmKPExsUSY1A/T7fijqGfwZsubYvmC+kOjB73z9xi
	D2CM4rJJSc3JLEst0rdL4MpYfPw7U8E5/oorf64xNzD+5Oli5OSQEDCR2PRnGguELSZx4d56
	ti5GLg4hgWOMEsf/dLNAOAuZJD5+Xc4IUsUmoCLxs2M/O4jNLKAlcePfSyYIW1ti2cLXzCC2
	sIClxK3zd8DiLAKqEpcefwDr5RVwkNix4wIbiC0i4CRxrgFkGwdQ3Fji9T8miCPkJRa3fGac
	wMg7C8mGWUg2zELoWMDIvIpRsjjNwDC3wkivODW5tCizpDItP7m0WC85P3cTIzB8DqyoUNjB
	eOGi7iFGAQ5GJR7erCJDPyHWxLLiytxDjJIcTEqivH03gEJ8SfkplRmJxRnxRaU5qcWHGCU4
	mJVEeFMWA+V4UxIrq1KL8mFSMhwcShK8KbeBUoJFqempFWmZOcAogUkzcXCCtPMAtTeB1PAW
	FyTmFmemQ+RPMepytM86dpRRiCUvPy9VSpy3GqRIAKQoozQPbg4sdi8xykoJ8zIyMDAI8RSk
	FuVmlqDKv2IUB3pMmNcdZApPZl4J3KZXQEcwAR3Bygd2REkiQkqqgXH14Z5H80L3BvLeLg85
	fI25e36aYevV68wnNR7Pe8bkIjI9bJPhUg2Zoxsc/sTFh7M88ZKVvlb8g2nLL6np7+1WTLiT
	a1QippB5bsbONxUWxScr3h69/nu9Fdfv3fVifQ9u3Zz5OvSGt9n/Euam9Dl9Hie0tnmnBWTu
	0bHsal3Tc+LCbLs7gbeVWIozEg21mIuKEwFLH7hL2AIAAA==

Product Name: Sitecore CMS 6.4
Vendor: http://www.sitecore.net
Date: 28 July, 2011
Author: tom@xxxxxxxxxxxxx <tom@xxxxxxxxxxxxx>
Original URL: =
http://www.tomneaves.com/Sitecore_CMS_Open_URL_Redirect.txt
Discovered: 30 June, 2011
Disclosed: 28 July, 2011

I. DESCRIPTION

Sitecore is a CMS system used widely throughout the world by businesses, =
universities and banks.  A vulnerability exists that
allows an attacker to insert content from a malicious site within the =
context of Sitecore.  A user could be tricked into thinking
the content originated from the trusted site when infact it is from the =
attacker's.

II. DETAILS

An Open URL Redirection Vulnerability exists in Sitecore CMS 6.4 (and =
previous versions) which allows an arbitrary URL (content)
to be injected into the page.  The Sitecom titlebar window is still =
shown to the user however the content that is loaded comes from
the user specified location.  An attacker could provide content from a =
malicious site which the user would believe originated from
the trusted site - particularly with the Sitecom titlebar window still =
present.  This URL is accessible by unauthenticated users -
therefore ideal for a phishing attack.

---

As an unauthenticated user, the "url" parameter can be manipulated in =
the GET request to an arbitrary value:

=
http://victim.com/sitecore/shell/default.aspx?xmlcontrol=3DApplication&url=
=3Dhttp://www.attacker.com&ch=3DWindowChrome&ic=3DApplications%2f32x32%2fa=
bout.png&he=3DAbout+Sitecore&ma=3D0&mi=3D0&re=3D0

---

Affected Versions: All versions of Sitecore up to and and including CMS =
6.4 (Sitecore.NET 6.4.1 (rev. 110324)).

III. VENDOR RESPONSE

30 June, 2011 - Contacted vendor.
30 June, 2011 - Vendor acknowledged and confirmed vulnerability (348199)
27 July, 2011 - Vendor releases update (CMS 6.4.1 update-3)
28 July, 2011 - Vulnerability publicly disclosed.

IV. CREDIT

Discovered by Tom Neaves (Verizon Business)=

--91D1980998.1311951557/sf01smtp2.securityfocus.com--


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux