lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <005901c3bf82$2a218780$777ba8c0@btech>
Date: Thu, 11 Dec 2003 02:00:26 +0100
From: "Somers Raf" <raf.Somers@...dora.be>
To: "BUGTRAQ" <bugtraq@...urityfocus.com>
Subject: Cyclonic Webmail 4 multiple vulnerabilities


Software: Cyclonic Webmail
Version : 4
vendor : Stallion Networking


1. Software description
   ----------------------

Cyclonic is a webbased interface allowing users to handle emails
stored on a POP Server.
This software is Freeware


2. Vulnerability description
   -------------------------
    - bypassing the login script
    - reading other users data and/or emails
    - session hijacking
    - spoofing emails
    - possibility to put files in the webroot


3. Problems with user authentification
   ------------------------------------
File: cyclonic.pl

A user is asked to enter a username, a password and the address
of the popserver. Since the server is specified by the client,
ANY POP can be given. The script passes the username and password
to a POP server and uses the server-responses to validate a user.
Once validated it requests that users mailboxstatus on the POP
server with the STAT command.

This procedure allone has a few problems.
First of all, ANYONE with a POP account can use your Webserver
and bandwidth to read his emails, no matter it's your mailserver
or that of some other provider.
Secondly, for some exploits described further down, one will
need to login. This can easilly be accomplished by validating
yourself with one of your own emailaccounts with another provider
or a little script that fakes POP responses.

4. Session Hijacking
   -------------------

Once you are logged in, the only authentification method the scripts
will use is a SessionID, that is passed from one script to another
tru the URL. So if you know a sessionID from other sessions you could
easilly hijack that session. Sessiondata is stored in a file that has
the sessionID as name, by default this is in a subfolder named /sids/.
So if the webserver has directorylistin enabled, one can easilly
obtain other session ID's by surfing to the /sids/ subfolder and then
use this ID to 'hijack' another session.

cyclonic.pl?SESSIONID=***********&CURRENTFOLDER=Inbox

(replace *'s with the sessionID)


5. Problems with default storage directories
   ------------------------------------------
By default the userdata is stored in a subfolder called /users/. If a users
reads an
email with the webinterface, the email, and any attachment, is stored in
/users/USERNAME/DECODE/ , making it accessoble to anyone. emails are stored
within this
folder without any form of encryption. Also stored in the users folder, in
cleartext, is
the users addressbook.

Since attachments, are stored, unencrypted, within the webroot, theoraticaly
one is able
to set up scripts and run them on the server.



6. Spoofing emails
   -----------------

As described in point 3, bypassing the login is easy, either by using a 3d
party POP server,
or by session hijacking. When this is done the user can go to the options
screen to set his
name and emailaddress. these values are used when sending email.
Cyclonic reads email from a POP account, but for sending emails it uses an
internel mailserver.
By specifying a username and emailadres (not validated in ANY way) a user
can completely
hide himself. Sending an email as 'admin@...tingserver.net' would look
perfectly legitimate.



Best regards

Somers Raf



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ