exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

qdav-2001-11-1

qdav-2001-11-1
Posted Nov 20, 2001
Site qdefense.com

qDefense Security Advisory QDAV-2001-11-1 - A vulnerability in Hypermail SSI has been discovered that allows users to execute arbitrary commands on a server running Hypermail and SSI.

tags | arbitrary
SHA-256 | 1f00acda38a91de5892bf56ba2d321748d458c17881de94dda4ec2e0d925c6d9

qdav-2001-11-1

Change Mirror Download


---------- Forwarded message ----------
Date: Mon, 19 Nov 2001 14:36:55 -0500
From: qDefense Penetration Testing <advisories@qDefense.com>
To: bugtraq@securityfocus.com
Subject: Hypermail SSI Vulnerability


Hypermail SSI Vulnerability
qDefense Advisory Number QDAV-2001-11-1

Product: Hypermail

Vendor: Hypermail Development (http://www.hypermail.org)

Severity: Remote; Attacker may be able to execute arbitrary commands on
servers that run Hypermail and SSI

Vendor Status: Vendor contacted; patch released

In Short: Hypermail can be used to create arbitrary files, with arbitrary
extensions, on the server, which may then possibly be used to execute SSI
commands.


The current version of this document is available at
http://qDefense.com/Advisories/QDAV-2001-11-1.html.

Details:

Hypermail converts e-mails into HTML. It is generally used to automatically
create web archives of mailing lists. When e-mails are archived,
attachments which are included are archived as well. The attachments are
not modified before archival, and they are stored under the filename
contained in the e-mail.

An attacker can therefore create an arbitrary file on the web server with
an arbitrary extension. If the server supports SSI, an attacker can include
SSI commands in a file, give it the SSI extension (normally .shtml), and
mail it. This will create the desired file on the server. The attacker can
than cause the server to execute those SSI commands by requesting the
attachment.

It should be noted that creation of arbitrary files on a web server carries
with it additional insecurites besides SSI, and therefore even servers that
do not support SSI may be vulnerable.

Solution:

Hypermail has been patched to convert .shtml extensions to .html. As of
this writing, no further correction has been taken.

Servers should never allow SSI, CGI, or any other type of server processed
content in the hypermail directory.

(C) 2001 qDefense Penetration Testing. qDefense Penetration Testing is a
subsidiary of Computer Modeling Corp.
This document may be reproduced, in whole or in part, provided that no
modifications are made and that proper credit is given. Additionally, if it
is made available through hypertext, it must be accompanied by a link to
the qDefense Penetration Testing web site, http://qdefense.com.

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close