what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

maildrives.txt

maildrives.txt
Posted Nov 6, 2006
Authored by Attila Gerendi

viksoe's GMail Drive shell extension and GSpace suffers from flaws that allow for arbitrary file injection, folder creation, and more.

tags | advisory, arbitrary, shell
SHA-256 | 4eb96b9eb20c590be8dd26fa79ad868bc0295d2b185604459b85248d9aab64c7

maildrives.txt

Change Mirror Download
Mail Drives Security Considerations
===================================

Author: Attila Gerendi (Darkz)
Date: November 03, 2006


There are more "mail drive" solutions available like "GMail Drive",
"GSpace", "Gmail FS", etc.. These systems are built to store ordinary
files in email accounts (usually gmail because it's free 2Gb++ space).

In some of these solutions the files and folders usually are stored as
attachments in a special email. The file system does not have FAT (File
Allocation Table) and the informations regarding the name and path of
the files/folders are stored in the email SUBJECT field. Additionally
there is no mechanism to filter these emails.

So the problem is the remote attacker can shout blindly emails which
describe a file or folder in this file systems and manipulate or inject
files into that file system. This may be used for a new spam type or to
inject undesirable/malicious files into someone's file collection. At
the first sight this can not be worse then plain email spamming, however
because this concept is extending the email use if no sanitation will be
included then it will extend the spam use as well, some malicious people
will find out new malicious solutions for particular or generic situations.

A few examples are described below, other may exist.

1. viksoe's GMail Drive shell extension
---------------------------------------

- file injection. You can inject files into the "GMail Drive file
system" by sending email with Subject: "GMAILFS: /new_filename.txt
[13;a;1]" and "new_filename.txt" as attachment. However if the sender is
not "self" then the filename will be displayed with red color. The
sender email address can be spoofed.

- folder creation. You can create new folder by sending email with
Subject: "GMAILFS: /new_folder/. [14;a;1]"

- rewrite file contains. You can overwrite file displayed content
sending email with Subject: "GMAILFS:
/existing_path/existing_filename.txt [13;a;1]" and "filename.txt" as
attachment. However if the sender is not "self" then the extension will
display 2 files with the same name but both will have the same new content.



2. Gmail File Space(GSpace) by Rahul Jonna
------------------------------------------

- file injection. You can inject files into the "GSpace file system"
by sending email with Subject: "GSPACE|new_filename.txt|2174|1|1|1|gs:/
d$" and putting "new_filename.txt" and "metadata.txt" as attachment.
However the interface will fill the "from" information with the sender
email address. The sender email address can be spoofed.

- folder creation. You can create new folder by sending email with
Subject: "GSPACE|test/|-135|1|1|0|gs:/ d$" and "blank.txt" and
"metadata.txt" as attachment. However the interface will fill the "from"
information with the sender email address. The sender email address can
be spoofed.


Solution:
---------
there are more possible solutions to filter unwanted content, such as
inserting unpredictable id-s in the emails, message signing, but none
(in my opinion) which can offer backward compatibility.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close