what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

altnwebadmin.txt

altnwebadmin.txt
Posted Aug 27, 2006
Authored by TTG

Alt-N WebAdmin versions 3.2.3 and 3.2.4 running with MDaemon version 9.0.5 are susceptible to a directory traversal attack.

tags | exploit
SHA-256 | 72c19e7cb362ea5ae509f0865fb12a638c781d3c384beba7be266c78cd52960d

altnwebadmin.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

TTG0601 - Alt-N WebAdmin Multiple Vulnerabilities

RELEASE DATE:
August 21st, 2006

VENDOR:
Alt-N Technologies ( http://www.altn.com )

VULNERABLE:
Tested on Alt-N WebAdmin v3.2.3/3.2.4 running
with MDaemon v9.0.5, earlier versions are
suspected vulnerable as well

SEVERITY:
Authenticated users have access to higher level
accounts and files on the server

OS:
Microsoft Windows XP/2000/2003



SUMMARY

WebAdmin is a remote administration utility which allows administrators to
manage Alt-N's MDaemon, RelayFax and WorldClient products. Recently this
has become a standard module for the company's MDaemon mail server, altough
it remains available independently as well.

The WebAdmin product page touts it's configurable access rights feature.
However, tested versions have been found vulnerable to a privilege elevation
vulnerability which could lead to compromise of the mail server and which,
in combination with insufficient input sanitation in some of it's modules,
could allow malicious users access to sensitive files on the server.

This includes the system's weakly encoded password file.



DETAILS

Due to input to the administrative interface's logfile_view.wdm and
configfile_view.wdm files not being properly sanitized, authenticated global
administrators are allowed access to the underlying filesystem like so:

http://mdaemon:1000/configfile_view.wdm?file=../../autoexec.bat
http://mdaemon:1000/logfile_view.wdm?type=webadmin&file=../../App/userlist.dat

Note that this is not a service offered by the administrative interface
itself.
Also of note is that the second example retrieves the server's password file
which, as noted earlier by Obscure(1), is easily decodable.

Mitigating this problem is the fact that the user has to be a global
administrator to be allowed access to logfile_view.vdm and
configfile_view.vdm.

It has also been found however that while the web interface appears to
distinguish between user levels (namely global administrator and domain
administrator) and indeed touts this ability on it's product page, all
authenticated administrators within the same domain regardless of level are
allowed to modify all user accounts and passwords through userlist.wdm,
including the details and passwords of global administrator accounts.



IMPACT

The impact of these vulnerabilities in a small environment using only trusted
administrators is low if the default HTTP solution is not used. In larger
environments were one to trust on WebAdmin's user restrictions the impact of
mentioned problems is larger, as they effectively allow third parties
unauthorized access to the full mail server configuration and the file
system below.



WORKAROUNDS

It is suggested that administrators do not access the administrative
interface over it's own server and as such the inherently insecure HTTP
protocol, but install it on another, SSL capable server.

Also, it would be wise to not allow regular users access to their domain
configurations through the administrative interface, no matter the server.



FIX

Vendor was notified and response was swift. First contact was established
on August 14 and WebAdmin 3.25 which fixes these issues(2) was made available
on August 18.



REFERENCES

(1) Multiple Vulnerabilities in MDaemon + WorldClient by Obscure of Eye
on Security
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0057.html

(2) WebAdmin Server v3.25 Release Notes
http://files.altn.com/WebAdmin/Release/RelNotes_en.txt



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE6gCIXSyYXTPz6J0RAjMWAJ9GQQCuzP0zngp3lNQ7hg3ODfoo+ACfYiqV
81UXnzFz5McMyXdC6Cr6Uc0=
=pqQg
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close