what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Trend Micro Hosted Email Security (HES) Interception / Insecure Direct Object Reference

Trend Micro Hosted Email Security (HES) Interception / Insecure Direct Object Reference
Posted Aug 24, 2017
Authored by Patrick Webster

Trend Micro Hosted Email Security (HES) suffers from email interception and insecure direct object reference vulnerabilities.

tags | exploit, vulnerability
SHA-256 | b05cc034ae6b0b1c59afe01f4ef720d5545f811f1fcc30f3cf6db2bc68cf4f8c

Trend Micro Hosted Email Security (HES) Interception / Insecure Direct Object Reference

Change Mirror Download
Date:
24-Aug-2017

Product:
Trend Micro Hosted Email Security (HES)

Versions affected:
Hosted Email Security before January 2012.

Vulnerability:

Two vulnerabilities were discovered.

The first allowed any HES user to intercept in-transit emails through
the Trend Micro Hosted Email Security cloud environment. The platform
allowed anyone to register an account online instantly and test the
solution. Users were required to 'activate' (enter) a domain name,
then update their MX records to enable filtering. However, to enable
migration testing, rules became active immediately without waiting for
MX records to be updated. This was intended, however the HES
environment itself was shared across all customers - therefore anyone
could create a policy for a domain which wasn't theirs or a
pre-existing customers and start intercepting, modifying / rewriting
content, BCC copying emails, quarantining or deleting messages which
came from@domain.com or to@jackeddomain.com if passed through HES.

Reproduction steps:

1) Register a free Trend Micro HES account.
2) Activate a domain name you want to filter - be creative (gmail.com,
mac.com, apple.com, microsoft.com, ibm.com, plus banks / military /
large ISPs / government domains worked exceptionally well!)
3) While the domain has not been valid, create a new policy rule, e.g.
"BCC all messages" to your personal email address.
4) Watch your inbox run out of disk space.

Interception revealed Sender, Recipient, Subject and in some cases
entire email contents with attachments if applicable.

Email Interception Statistics
###
7,000 emails in 3 hours.
21,000 emails in 13 hours.
78,500 emails in 24 hours.
96,000 emails in 30 hours.
1,221,535 emails in 8 days.
###

The second vulnerability allowed any HES authenticated customer to
view or change other cloud user's rules via Direct Object Reference.

E.g.

https://us.emailsec.trendmicro.com/editRule.imss?ruleid=44281
https://us.emailsec.trendmicro.com/editRule.imss?ruleid=44282
https://us.emailsec.trendmicro.com/editRule.imss?ruleid=44283 etc

Credit:
Discovered by Patrick Webster

Disclosure timeline:
09-Dec-2011 - Interception issue discovered during testing. Reported to vendor.
10-Dec-2011 - Developers investigating interception report.
11-Dec-2011 - Direct object policy rule access / edit discovered and
reported to vendor.
12-Dec-2011 - Vulnerabilities confirmed.
16-Dec-2011 - Direct object policy rule issue fixed in production.
23-Dec-2011 - Interception fix pushed to production environment.
27-Dec-2011 - Final intercepted email received (numbering several million).
28-Dec-2011 - Delivery Status Notification success/failures continue
to be received.
11-Jan-2012 - Delivery Status Notification fix pushed to production.
Last DSN received.
24-Aug-2017 - Public disclosure for historical purposes as an example
of early cloud adoption issues facing the industry.

About OSI Security:

OSI Security is an IT security consulting company based in Sydney,
Australia. We provide managed internal and external penetration
testing and ethical hacking services, web application testing,
vulnerability assessments, wireless site audits, vendor product
assessments, secure network design, forensics and risk mitigation
services.

We can be found at https://www.osisecurity.com.au/
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close