exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

DAa12.15.2005.txt

DAa12.15.2005.txt
Posted Dec 28, 2005
Authored by Oliver Muenchow | Site digitalarmaments.com

Digital Armaments advisory is 12.15.2005 - WEBsweeeper/MIMEsweeper suffers from a vulnerability in its regular expression which can allow an attacker to trick a user to execute malicious code on his system

tags | advisory
SHA-256 | a71683664a998ad26658adb77769a43c2cc486692573adfbc3b6db5408abc6e6

DAa12.15.2005.txt

Change Mirror Download
WEBsweeper/MIMEsweeper Executable File Content Check bypass Vulnerability 


Digital Armaments advisory is 12.15.2005
http://www.digitalarmaments.com/2005161283546323.html

I. Background

WEBsweeeper/MIMEsweeper is a commercial software that brings policy-based content security to the HTTP gateway. For many information or detail about the software you can refer to the vendor's homepage:

http://www.mailsweeper.com/

II. Problem Description

An attacker could trick a user to click on a mail link/attachment to download and run a malicious code (any malicious application in a .exe file). The ".exe" files should be filtered according to the security policies, but an attacker can trick to fail this test if the data sent to the webserver does not include the ".exe" extension. This problem persist on all platform where the data sent to a webserver (GET or POST) is fetched via a server side language (asp, php, etc..) that doesn't explicitly contain those regular expression. An example is:

http://yourattack.server/asp?cmd=data&maliciouscodewithnumber&number=123

III. Detection

This problem has been detected on latest version of WEBsweeper and MIMEsweeper actually avaiable and on prior version. It persist on all platforms.

IV. Impact analisys

Successful exploitation allow an attacker to easily trick a user to execute malicious code on his system. This attack bypass the protection offered by those content filter application. No exploit code is required. This attack can also be use in a massive way versus clients systems.

V. Solution

The vendor has given no response.
First notification 12.15.2005.
Second notification 12.19.2005.

VI. Credit

Oliver Muenchow - o.muenchow@netprotect.ch is credited with this discovery.

Get paid and get stocks by vulnerabiliy submission
http://www.digitalarmaments.com/contribute.html

VII. Legal Notices

Copyright © 2005 Digital Armaments LLC.

Redistribution of this alert electronically is allowed. It should not be edited in any way. Reprint the whole is allowed, partial reprint is not permitted. For any other request please email customerservice@digitalarmaments.com for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available
information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close