Ability Mail Server Lets Remote Users Deny Service and Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID: 1010672|
SecurityTracker URL: http://securitytracker.com/id/1010672
(Links to External Site)
Date: Jul 12 2004
Denial of service via network, Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information|
Exploit Included: Yes |
Some vulnerabilities were reported in the Ability Mail Server. A remote user can conduct cross-site scripting attacks. A remote user can also cause denial of service conditions.|
Dr_insane reported that the 'errormsg' parameter is not properly filtered to remove HTML code. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Ability Mail Server software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Some demonstration exploit URLs are provided:
It is also reported that a remote user can establish approximately 150 to 200 connections to the webmail service (port 8000), admin service (port 8880), and SMTP service (port 25) to cause CPU utilization to reach 100% and cause the system to stop providing any services.
The original advisory is available at:
A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Ability Mail Server software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.|
No solution was available at the time of this entry.|
Vendor URL: www.code-crafters.com/abilitymailserver/index.html (Links to External Site)
Input validation error, Resource error|
|Underlying OS: Windows (Any)|
This archive entry has one or more follow-up message(s) listed below.|
Source Message Contents
+ Ability Mail server 1.18 Dos attack and Css Vulnerabilities+
Microsoft Windows NT 4.0 (all versions)
Microsoft Windows 2000 (SP3 and earlier)
Microsoft Windows XP (all versions)
"Ability Mail Server has been designed to be small, fast, reliable, advanced and very
This easy to use mail server supports SMTP, POP3, IMAP4, WebMail, Remote Admin, Virus
Two vulnerabilities have been identified in Ability mail server 1.18 that may allow a
to get access to a remote sustem or cause a Dos attack.
1 - The first vulnerability is an Xss attack. Input passed to "errormsg" parameter isn't
before being returned to users.This can be exploited to execute arbitrary HTML and script
code in a user's
browser session in contextof a vulnerable site by tricking the user into visiting a
malicious website or
follow a specially crafted link.
2 - The second vulnerability is a denial of service condition. By establishing about
with three services at the same time CPU usage will hit 100% and the system will stop
offering any services.
example: Try to establish at the same time 150-200 connection with Webmail service(8000),
admin service(8880) and SMTP service (25).
Use another product.
Please send your comments to: firstname.lastname@example.org