exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

eeye.99-05-26.mult_web_interface

eeye.99-05-26.mult_web_interface
Posted Sep 23, 1999

eeye.99-05-26.mult_web_interface

SHA-256 | 3ad3f904295e6f4482cc582b41a652a6d50b69a0dee2928c7149a825a6a4fa20

eeye.99-05-26.mult_web_interface

Change Mirror Download
   
eEye - Digital Security Team Alert

Multiple Web Interface Security Holes
Systems Affected
CMail 2.3
FTGate 2,1,2,1
NTMail 4.20
Release Date
May 26, 1999
Advisory Code
AD05261999
Description:
The following holes were found while testing Retina against a few various services that have web
based interfaces. The holes are nothing amazing just common amongst many web based interfaces. We
are sure some other software will be found with similar holes... if you come across some contact
info@eeye.com and let us know.
CMail
The default location of the web based interface for CMail is C:\Program Files\Computalynx\CMail
Server\pages\. It is a simple hole. For example if we were to load
http://[server]:8002/../spool/username/mail.txt in our web browser we would be looking at the email
for that user. Note: Mail.txt is not the real mail file. There is one minor problem... reading of
files is not totally straight forward. It seems CMail has some mechanism of what it will read or
not. If you have a text file with no carriage returns in it CMail will not read it. There also
exists multiple buffer overflows within the various SMTP and POP server functions of CMail. Yes they
are exploitable. >:-]
FTGate
Same as above basically. http://[server]:8080/../newuser.txt The only difference is that FTGate
doesn't seem to mind if the file has the carriage returns or not.
NTMail
NTMail suffers from the same programming flaw... http://[server]:8000/../../../../../boot.ini.
There is other server software out there that suffers from these common holes. An average of 65% of
the software we have tested thus far has had problems with restricting the path that they allow.
NTMail as well as the other two can be run as a service, NTMail does it by default, therefore you
can read files as SYSTEM on most of them.
Fixes
Disable the web interfaces where applicable until the vendors release patches.
Vendor Status
All vendors have been notified.
Copyright (c) 1999 eEye Digital Security Team

Permission is hereby granted for the redistribution of this alert electronically. It is not to be
edited in any way without express consent of eEye. If you wish to reprint the whole or any part of
this alert in any other medium excluding electronic medium, please e-mail alert@eEye.com for
permission.

Disclaimer:

The information within this paper may change without notice. Use of this information constitutes
acceptance for use in an AS IS condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any damages whatsoever arising out of or in connection
with the use or spread of this information. Any use of this information is at the user's own risk.

Please send suggestions, updates, and comments to:

eEye Digital Security Team

info@eEye.com
http://www.eEye.com

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close