exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

NuralStorm Webmail Cross Site Scripting / Shell Upload

NuralStorm Webmail Cross Site Scripting / Shell Upload
Posted Jul 13, 2010
Authored by Justin C. Klein Keane

NuralStorm Webmail version 0.985b suffers from cross site scripting, disclosure and shell upload vulnerabilities.

tags | advisory, shell, vulnerability, xss, info disclosure
SHA-256 | 87b1b77abb1761e2c38189b3ae0aea0e15431e70b50b65cbf6474919342c5afc

NuralStorm Webmail Cross Site Scripting / Shell Upload

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Full details of this report are available at:
http://www.madirish.net/?article=466

A recent code audit of the NuralStorm Webmail system revealed a number
of serious vulnerabilities. If you are using NuralStorm please review
the following vulnerability report. It is recommended that you restrict
access to any NuralStorm installations immediately and disable
NuralStorm if possible. There is currently no patch or work around for
the vulnerabilities described below.

Description of Vulnerability:
- -----------------------------
NuralStorm Webmail is an Open Source web based e-mail client written in
PHP. NuralStorm is distributed from http://www.nuralstorm.net/.

NuralStorm Webmail contains a cross site scripting (XSS) vulnerability
because it fails to sanitize output of HTML e-mail before display. This
vulnerability is particularly dangerous because NuralStorm keeps login
credentials stored in cookie values. This combination of vulnerability
and architecture means that attackers can steal login credentials via
JavaScript injection into mail sent to targeted users.

NuralStorm contains multiple stored XSS vulnerabilities in the
addressbook functionality because nickname and e-mail address values are
not sanitized before display.

NuralStorm contains an arbitrary file upload vulnerability because it
fails to sanitize the value of variables stored in client side cookies
(COOKIE_SESSSION) before using these variables to determine upload
locations. This vulnerability could allow attackers who can compose
messages to upload arbitrary PHP to the NuralStorm server to directories
that are writable by the web server.

NuralStorm is also vulnerable to numerous cross site request forgery
(XSRF) attacks because forms for input do not have any protection
mechanisms, such as one time tokens, implemented.

NuralStorm contains an information disclosure vulnerability because it
does not sanitize input to the book.php page. Attackers requesting a
URL could expose the addressbook of the valid system users.

NuralStorm contains a reflected XSS vulnerability in book_include.php
because it fails to sanitize the BGCOLOR parameter before it is included
in the page display. Attackers can exploit this vulnerability via URL.

NuralStorm contains an arbitrary file deletion vulnerability in
maintenance.php. Attackers can use URL variables to cause the web
server to delete arbitrary files.

NuralStorm allows arbitrary email to be relayed via problems.php without
authentication. This vulnerability can be exploited via maliciously
crafted URL parameters.

NuralStorm settings.php contains an unauthenticated arbitrary file write
vulnerability. Attackers can use this vulnerability to write arbitrary
PHP to directories writable by the web server. This vulnerability could
be used to inject PHP shell backdoors.

Systems affected:
- -----------------
NuralStorm 0.985 b was tested and shown to be vulnerable.

Impact
- ------
Highly critical. Attackers could use XSS in message sent to victims to
perform all of the attacks described above, including the arbitrary file
upload attack. Using the proof of concept below unauthorized attackers
can write arbitrary PHP with privileges of the web server. This could
lead to PHP shell injection and web server compromise. A denial of
service threat exists where the web server has access to delete files.
XSS attacks could reveal credentials as these are stored unencrypted in
cookies. Because NuralStorm uses account credentials for POP/IMAP
authentication these credentials are likely to provide shell access (SSH
or Telnet), therefore credential exposure could provide shell access.

Vendor Response
- ---------------
Contact attempts with vendor have been unsuccessful, emails to all
published contacts (including domain registrants) bounced. The project
was last updated nearly 8 years ago so it is reasonable to assume that
it has been abandoned.

- --
Justin C. Klein Keane
http://www.MadIrish.net

The digital signature on this message can be confirmed
using the public key at http://www.madirish.net/gpgkey
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iPwEAQECAAYFAkw7BQQACgkQkSlsbLsN1gAy3gb+JT0KxlQY4V5ToJJmURd7s/HB
mg0ombm/M97rsMwZokCO2Kz5he/HMXWeDm6eOYP+F12CDjjK6gn40Z/TccCn7WV2
uzrUQIVKxKxPbArpYcVogN7VMwhTLa3BNwRf3ZwyaWedvkFFUKLdbdkQbIXnUeyr
4wj5Dpbp1yvtOnaKtUeVXZGn2r2Xokc6INw9CYvazzol+nlbfCgvRXYmTT8EWZLT
GOAkIWPynKip+MEJJkTbrDgE5r08NgkdL18MTLC0Im5kqoLb6tWeAc9YAZn28yYy
ZHi8T3KJv+ZD8IUCvzc=
=dSOs
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close