Re: Spam Sent From WebMail

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 10/9/07, Nick Bright <nick.bright@xxxxxxxxxxxxxx> wrote:
> Paul Lesniewski wrote:
> > On 10/9/07, Ken A <ka@xxxxxxxxxxx> wrote:
> >> Nick Bright wrote:
> >>> Ken A wrote:
> >>>> Nick Bright wrote:
> >>>>
> >>>>> Per some suggestions in the thread I was able to determine that they are
> >>>>> not using "mailto.php", but rather compose.php:
> >>>>>
> >>>>> /var/log/httpd/access_log:196.1.179.183 - - [07/Oct/2007:21:54:10 -0500]
> >>>>> "GET /webmail/src/compose.php?mail_sent=yes HTTP/1.1" 200 37102
> >>>>> "http://webmail.terraworld.net/webmail/src/compose.php?mailbox=None&startMessage=0";
> >>>>>
> >>>>> "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)"
> >>>>
> >>>> Are you saying that was the only entry in the log from that IP? They
> >>>> only hit compose.php? If not, what was the sequence of events?
> >>> There were many hits from quite a few different IP addresses, and they
> >>> all looked simmilar to that. I've extracted log entries from that IP
> >>> address, and attached the file to this message.
> >>>
> >>>  From what I can tell it logs in, then hits compose.php repeatedly.
> >> That's odd. It really doesn't look like a bot.
> >
> > I agree - a bot probably wouldn't hit any options pages, etc.
>
> Someone else said that they saw the same behavior, and the bot was
> hitting the options page to change the FROM address and users' name.
>
> >
> >> Perhaps it's using an IE
> >> toolbar of some sort to control the browser. There is a CAPTCHA plugin,
> >> and a "Password Forget" plugin, but when a bot behaves like a user, it's
> >> hard to block without inconveniencing the user. :-\
> >
> > Right.  I would suggest the Restrict Senders plugin is what the OP
> > wants if "mitigation" is the goal.  "Re-coding whatever is allowing
> > these POST url's to send mail" is meaningless unless you want SM
> > without compose functionality.
>
> I'll look at the restrict senders plugin.
>
> My suggestion about not allowing POST to send mail is based on me not
> knowing anything about how SM works, but the thought of "if they can't
> craft a URL to send mail and poke it to the server, wouldn't that fix
> the issue?". Seems like GET should be just as valid, and prevent an
> injection exploit like this appears to be.

You yourself seemed to agree it *isn't* an injection exploit.  If you
are claiming it is, we need evidence to support that.  GET is *more*
vulnerable in general than POST to various forms of abuse, not to
mention that it just wouldn't work for a form with this much data in
it.  Your problem is exposed passwords, so I don't know why you are
suggesting SM's internal mechanism for sending mail be modified.

> Please keep in mind I am not a programmer, just a user, so there's not
> much good in raking me over the coals with programming arguments.
>
>   - Nick Bright
>

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
--
squirrelmail-users mailing list
Posting Guidelines: http://www.squirrelmail.org/wiki/MailingListPostingGuidelines
List Address: squirrelmail-users@xxxxxxxxxxxxxxxxxxxxx
List Archives: http://news.gmane.org/thread.php?group=gmane.mail.squirrelmail.user
List Archives:  http://sourceforge.net/mailarchive/forum.php?forum_id=2995
List Info: https://lists.sourceforge.net/lists/listinfo/squirrelmail-users

[Index of Archives]     [Video For Linux]     [Yosemite News]     [Yosemite Photos]     [gtk]     [KDE]     [Cyrus SASL]     [Gimp on Windows]     [Steve's Art]     [Webcams]

  Powered by Linux