lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: tharbad at kaotik.org (Joao Gouveia)
Subject: IMAP4rev1 2000.283 allows access to system
	files

This is a known, old issue AFAIK.

Joao Gouveia
------------
tharbad@...tik.org

On S?b, 2002-08-10 at 18:31, Guy Cohen wrote:
> Hi,
> 
> This just might be misconfiguration on the one imap server I have access
> too, but It might not.
> 
> when trying to check what's up with my mail using telnet, I've
> issued a command: LIST "*" "*" and to my suprise got a listing of the files
> in my directory. I could run LIST "../*" "*" and get the listing of directories
> above mine. and so forth. Well then i tought to my self how far can this go,
> so i tried SELECT "/etc/hosts"; FETCH 1 (flags rfc822.text) and guess what
> I saw... then I went on to CREATE "/tmp/MyTest". Writing into other
> files is a little tricky but can be done with append after using select to
> find out if the file is writable.
> 
> 
> Cheers,
>   Guy
> 
> -- 
> Unix Administration,       |      http://www.unixadmin.co.il
> locally and remotely.      |      support@...xadmin.co.il
> Planning, installation,    |      Phone: 972-3-6201373
> support & upgrades.        |      Location: Unrestricted
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ