SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Ability Mail Server Vendors:   Code-Crafters
Ability Mail Server Lets Remote Users Deny Service and Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1010672
SecurityTracker URL:  http://securitytracker.com/id/1010672
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jul 12 2004
Impact:   Denial of service via network, Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Exploit Included:  Yes  
Version(s): 1.18
Description:   Some vulnerabilities were reported in the Ability Mail Server. A remote user can conduct cross-site scripting attacks. A remote user can also cause denial of service conditions.

Dr_insane reported that the 'errormsg' parameter is not properly filtered to remove HTML code. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Ability Mail Server software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Some demonstration exploit URLs are provided:

http://127.0.0.1:8000/_error?id=[id]&errormsg=[exploit_code]

http://127.0.0.1:8000/_error?id=[id]&errormsg=<script>alert(document.cookie)</script>

It is also reported that a remote user can establish approximately 150 to 200 connections to the webmail service (port 8000), admin service (port 8880), and SMTP service (port 25) to cause CPU utilization to reach 100% and cause the system to stop providing any services.

The original advisory is available at:

http://members.lycos.co.uk/r34ct/main/Ability_mail_server_1.18.txt

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Ability Mail Server software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.code-crafters.com/abilitymailserver/index.html (Links to External Site)
Cause:   Input validation error, Resource error
Underlying OS:  Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 21 2004 (Vendor Issues Fix) Ability Mail Server Lets Remote Users Deny Service and Conduct Cross-Site Scripting Attacks
The vendor has issued a fix.



 Source Message Contents

Subject:  http://members.lycos.co.uk/r34ct/main/Ability_mail_server_1.18.txt


http://members.lycos.co.uk/r34ct/main/Ability_mail_server_1.18.txt

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+ Ability Mail server 1.18 Dos attack and Css Vulnerabilities+
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Date: 11/07/2004


Severity:
Low

Systems Affected:
Microsoft Windows NT 4.0 (all versions)
Microsoft Windows 2000 (SP3 and earlier)
Microsoft Windows XP (all versions)
windows 9x

Description:
"Ability Mail Server has been designed to be small, fast, reliable, advanced and very 
feature rich.
This easy to use mail server supports SMTP, POP3, IMAP4, WebMail, Remote Admin, Virus 
Protection and
much more."
Two vulnerabilities have been identified in Ability mail server 1.18 that may allow a 
malicious user
to get access to a remote sustem or cause a Dos attack.

1 - The first vulnerability is an Xss attack. Input passed to "errormsg" parameter isn't 
properly sanitised
before being returned to users.This can be exploited to execute arbitrary HTML and script 
code in a user's
browser session in contextof a vulnerable site by tricking the user into visiting a 
malicious website or
follow a specially crafted link.

example: http://127.0.0.1:8000/_error?id=[id]&errormsg=[exploit_code]
example: http://127.0.0.1:8000/_error?id=[id]&errormsg=<script>alert(document.cookie)</script>

2 - The second vulnerability is a denial of service condition. By establishing about 
150-200 connections
with three services at the same time CPU usage will hit 100% and the system will stop 
offering any services.

example: Try to establish at the same time  150-200 connection with Webmail service(8000),
admin service(8880) and SMTP service (25).

Workaround:
Use another product.


Credit:
Dr_insane
Http://members.lycos.co.uk/r34ct/


Feedback
Please send your comments to: dr_insane@pathfinder.gr

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC