exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

EMUMAIL5.x.txt

EMUMAIL5.x.txt
Posted Feb 19, 2003
Authored by Dr. Insane

Parameter validation bugs exist in Emumail v5.x which allow remote denial of service and allow remote users to view any account history.

tags | exploit, remote, denial of service
SHA-256 | cec95ac394f94a6a107b3b73afcbbd0745d9caee836bd489e7c7cee5e292d689

EMUMAIL5.x.txt

Change Mirror Download
1)EMUMAIL 5.x parameter validation vulnerability. 
---------------------------

Summary
--------
Parameter validation bugs exist in 2 of the most popular Greek Free e-mail providers. The problem also there is on
many other servers worldwide.The affected software is EMUMAIL 5.x used by Mail.gr and the software used by Mailbox.gr remains
unidentified. This vulnerability allows the creation of arbitary folders that could potentialy lead to a DOS attack.

System(s) Affected
----------------
EMUMAIL 5.x used by Mail.gr (possibly EMUMAIL systems < 5 are also vulnerable)
Unknown Software used by Mailbox.gr


Exploit
------

The proof of concept code is provided below for EMUMAIL 5.x used by Mail.gr.
Emumail handles the folder arguments without any validation.
Upon execution of the below statement a folder will be created under the name
provided in the "folder=" parameter


http://www.mail.gr/email.fcgi?passed=select&reload.x=19&folder=SOMENAME

The same vulnerabillity exists in Mailbox.gr.

http://www.mailbox.gr/cgi-mailbox/webemail/read.cgi/greek?acc=accountnamehere&folder=SOMENAME

As you noticed both vulnerabilities exist in the passing of folder parameters
and the mishandle of the supplied arguments. We strongly believe that Mailbox.gr
is somehow "based" on EMUMAIL thus still vulnerable.


Also if you try to run the string below by using Internet explorer 6 sp1 the browser will crash:
( i have tested it on many systems)

http://www.mailbox.gr/cgi-mailbox/webemail/read.cgi/greek?acc=accountnamehere&folder=(about_2000+_characters)

(i don't know if the same thing happen to you)

Finaly if you run the string above on another browser (not IE) you will get this message from the server:

"Request-URI Too Large
The requested URL's length exceeds the capacity limit for this server.request failed: URI too long"

Maybe this can lead to a buffer overflow and execution of arbitary code.


-------------------------------------------------------------------------------------
2) MAILBOX Vulnerability ( software developed by SM-SOFT Information and EUROPLANET )

Summary
--------
Two other Parameter validation bugs exist in one of the most popular Greek Free e-mail provider.
The (unknown) affected software is used by mailbox.gr.This vulnerability allows the mass mailing
the promotion mail of mailbox.gr.The other bug allows unathorized view of the logon history from any account.


System(s) Affected
----------------
Unknown Software used by Mailbox.gr developed by SM-SOFT Information and EUROPLANET
Communication Informatics.


Exploit
------

The proof of concept code is provided below for Mailbox.gr.
The software handles the account arguments without any validation if it exists or not.
Upon execution of the below statements mailbox.gr's mail will be mailed to the mail provided after
the useremailas many time as you hit your return key.That could potentialy lead to fill up the usermail's
inbox,as the promotion mail is about 14kb.


http://www.mailbox.gr/cgi-mailbox/webemail/suggest.cgi?userid=whateverhere&useremail=mail@mpe.gr

The mail will appear to be mailed from whateverhere@mailbox.gr which is an invalid account name.


Now the other vulnerability allows the view of the logon history of any account.

http://www.mailbox.gr/cgi-mailbox/webemail/logoview.cgi?userid=accounthere

The execution of above statement will print on your screen the logon history under
the accounthere account name.




PATCH
-----
Vendor has been notified but no patch is still available.


-----------------
Vulnerability and exploit by: Dr_insane ------> dr_insane@pathfinder.gr
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close