what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SRADV00005.txt

SRADV00005.txt
Posted Dec 7, 2000
Authored by Secure Reality | Site securereality.com.au

Secure Reality Pty Ltd. Security Advisory #5 - All 3.x versions of MailMan Webmail below v3.0.26 contain remote command execution vulnerabilities. The code contains several insecure calls to open() containing user specified data. These calls can be used to execute commands on the remote server with the permissions of the user that runs CGI scripts, usually the web server user which is in most cases 'nobody'. Fix available here.

tags | exploit, remote, web, cgi, vulnerability
SHA-256 | b4dcc0b0843d1cb7fc27df32abe4794efcdd89522f9d488aea343af2e5078e74

SRADV00005.txt

Change Mirror Download
=================================================
Secure Reality Pty Ltd. Security Advisory #5 (SRADV00005)
http://www.securereality.com.au
=================================================

[Title]
Remote command execution vulnerabilities in MailMan Webmail

[Released]
6/11/2000

[Vulnerable]
All 3.x versions of MailMan Webmail below 3.0.26

[Overview]
MailMan is a product by Endymion corporation that provides a web based
interface to email via POP3 and SMTP. MailMan is very popular due to its
amazingly easy setup and operation.

MailMan is written as a Perl CGI script, the version which is shipped to
customers is obfuscated in an attempt to prevent piracy. The code contains
several insecure calls to open() containing user specified data. These calls
can be used to execute commands on the remote server with the permissions of
the user that runs CGI scripts, usually the web server user which is in most
cases 'nobody'.

[Impact]
Remote command execution (with privileges as above)

[Detail]
MailMan uses template files to define the appearance of the output so that
customers can brand the software to their particular service (e.g ISP,
Educational Institution).

In previous versions of MailMan the location of the template files was
static. Versions above 3 developed the ability to have multiple different
sets of template files. The location of the template files is defined by a
form variable called 'ALTERNATE_TEMPLATES'. When opening the alternate
templates MailMan fails to specify the '<' operator to the infamous Perl
open() statement, it then executes an open which looks like the following:

open("$ALTERNATE_TEMPLATES_<action>.html");

Where <action> is a defined template name. Obviously since we have control
of the $ALTERNATE_TEMPLATES variable we easily use pipe redirection to
execute commands on the remote server. The following request will execute
"id" on a vulnerable remote web server and return the output to the browser:

/mmstdod.cgi?ALTERNATE_TEMPLATES=|%20echo%20"Content-Type:%20text%2Fhtml"%3B
echo%20""%20%3B%20id%00

Please note that if $mailman::strLocalTemplateLocation is defined in the
configuration section at the top of the script (it is commented out by
default and is rarely enabled) this attack will fail since we won't be able
to effect the beginning of the open string.

[Fix]
Please upgrade to the latest version of MailMan (3.0.26) at
http://www.endymion.com/products/mailman/download.htm
(Please note all references on the web page indicate the latest version is
3.0.25 as they have not yet been updated, the version downloadable from the
download page _is_ 3.0.26 as can be verified in the comments at the top of
the script)

[Acknowledgements]
Our thanks to Ryan Porter of Endymion Corporation for his extremely
cooperative response to this problem.

[Disclaimer]
Advice, directions and instructions on security vulnerabilities in this
advisory do not constitute: an endorsement of illegal behavior; a guarantee
that protection measures will work; an endorsement of any product or
solution or recommendations on behalf of Secure Reality Pty Ltd. Content is
provided as is and Secure Reality Pty Ltd does not accept responsibility for
any damage or injury caused as a result of its use.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close