-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ******************** Netragard, L.L.C Advisory* ******************* Strategic Reconnaissance Team ------------------------------------------------ http://www.netragard.com -- "We make I.T. Safe." [POSTING NOTICE] - ---------------------------------------------------------------------- If you intend to post this advisory on your web page please create a clickable link back to the original Netragard advisory as the contents of the advisory may be updated. Netragard Research [About Netragard] - ---------------------------------------------------------------------- Netragard is a unique I.T. Security company whose services are fortified by continual vulnerability research and development. This ongoing research, which is performed by our Strategic Reconnaissance Team, specifically focuses on Operating Systems, Software Products and Web Applications commonly used by businesses internationally. We apply the knowledge gained by performing this research to our professional security services. This in turn enables us to produce high quality deliverables that are the product of talented security professionals and not those of automated scanners and tools. This advisory is the product of research done by the Strategic Reconnaissance Team. [Advisory Information] - ---------------------------------------------------------------------- Contact : Adriel T. Desautels Researcher : Philippe C. Caturegli Advisory ID : NETRAGARD-20061206 Product Name : @ Mail Product Version : 4.51 Vendor Name : Calacode Type of Vulnerability : XSS with filter evasion technique. Effort : Easy - ---------------------------------------------------------------------- Netragard Security Note: Source code obfuscation does not reduce the risk profile of any application as it has no impact on vulnerabilities that might exist within a particular application. @Mail code was obfuscated using basic obfuscation techniques. [Product Description] - ---------------------------------------------------------------------- "@Mail is a feature rich Email Solution, providing a complete WebMail interface for accessing email-resources via a web-browser or wireless device." - --http://www.atmail.com-- [Technical Summary] - ---------------------------------------------------------------------- @Mail does not properly sanitize email. While @Mail does pre-append a tags. This failure makes @Mail vulnerable to Cross-site Scripting Attacks ("XSS") via filter evasion. [Technical Details] - ---------------------------------------------------------------------- @Mail renders HTML emails by default. (Note: we did not find a way to disable this feature.) The emails that are received are parsed by the following code located in Global.pm which disarms basic XSS attacks. - -------8<------- SNIP Global.pm line 626 -> 635 SNIP -------8<------- my ( $I1I11I11I11IIIII, $I1I111I1111II1II );$_ = $I1111II1II1II1II->II1II1I11IIII111($I1I1II1II1I11II1);if (/)/ 635 SNIP -------8<------- The above code will replace " will then be executed when rendering an email with @Mail Webmail. Please note that the email parser will also replace http:// by a *** The code above will display an alert if vulnerable *** Note: Netragard's Strategic Reconnaissance Team was able to use this issue to hijack an @Mail users session. [Vendor Status] - ---------------------------------------------------------------------- Vendor Notified on 12/06/06 Vendor responded after 2 more notification attempts Vendor issued a patch. Vendor Comments (below): "Just to confirm the first advisery you sent, NETRAGARD-20061206, has already been fixed and included in the recent @Mail 4.61 patch for clients." [Disclaimer] - ---------------------http://www.netragard.com------------------------- Netragard, L.L.C. assumes no liability for the use of the information provided in this advisory. This advisory was released in an effort to help the I.T. community protect themselves against a potentially dangerous security hole. This advisory is not an attempt to solicit business.