[NT] FGatePro Multiple Vulnerabilities (Path Disclosure, CSS, Username Exposure)

From: SecuriTeam (support_at_securiteam.com)
Date: 09/04/03

  • Next message: SecuriTeam: "[NT] Additional Information Released on Microsoft WordPerfect Document Converter Buffer Overflow"
    To: list@securiteam.com
    Date: 4 Sep 2003 18:32:34 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      FGatePro Multiple Vulnerabilities (Path Disclosure, CSS, Username
    Exposure)
    ------------------------------------------------------------------------

    SUMMARY

     <http://www.ftgate.com/> FTGatePro "contains all the features you would
    expect from a world-class mail server, including anti-virus integration,
    sophisticated anti-SPAM options, comprehensive IP security features, NT
    SAM integration, SMTP/ESMTP, web server, web mail, LDAP, POP3, SmartPop,
    attachment filters, mail filters, system monitoring, MX delivery, dial-up
    facilities, scheduling, user mailboxes, list mailboxes, group mailboxes,
    robot mailboxes, autoresponder mailboxes and list servers. FTGatePro is
    fully compatible with Windows NT/2000/XP".

    The product has been found to contain multiple vulnerabilities allowing a
    remote attacker to cause the server to reveal the true path under which it
    is installed, to return arbitrary HTML and JavaScript code as if it were
    its own, and to inform the attacker whether the username he provided is
    valid or not.

    DETAILS

    Vulnerable systems:
     * FTGatePro version 1.22 build 1331

    Path Disclosure:
    By requesting the following URL:
    http://127.0.0.1:8089/utility/wmsecurity.fts, the following response will
    be received:
     Error in C:\Program Files\FTGate\Webs\WebAdmin\utility\wmsecurity.fts
    line 13, Undeclared Identifier 'null'

    This will allow a remote attacker to reveal the true path under which the
    product was installed.

    Cross Site Scripting:
    By requesting such a URL as: http://127.0.0.1:8089/help/index.fts?href=<
    script>alert('C.S.S')</script> it is possible to insert malicious HTML
    and/or JavaScript into pages that are returned by the server (this in turn
    will allow hijacking of accounts, etc).

    Remote User Verification:
    Because the server responds differently for invalid usernames and valid
    username, it is possible to determine whether a user provided username is
    valid.

    Example:
       Telnet 127.0.0.1 110
        
       +OK POP3 FTGatePro server ready
       user InValid

       -ERR InValid doesn't get mail here

       user user1
       +OK user1 gets mail here

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:vulncode@yahoo.com> Ziv
    Kamir.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[NT] Additional Information Released on Microsoft WordPerfect Document Converter Buffer Overflow"

    Relevant Pages

    • [NT] Multiple Vulnerabilities in HP Web JetAdmin (Read, Write, Execute, Path Disclosure, Password De
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... HP Web JetAdmin is an enterprise management system for large amounts of HP ... The web server is a modular service ... HP Web JetAdmin uses it's own encryption. ...
      (Securiteam)
    • [NEWS] Multiple Vulnerabilities in Oracle Database (Character Conversion, Extproc, Password Disclosu
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Multiple vulnerabilities were discovered in the (Oracle database server ... password is required to exploit this vulnerability. ...
      (Securiteam)
    • [NEWS] ColdFusion MX Oversize Error Message DoS
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... ColdFusion MX "is the solution for building and deploying powerful web ... shoots up and stays there until the server completes writing the error ... a long string of data as a GET or POST request to ...
      (Securiteam)
    • [NT] F-Secure Internet Gatekeeper Content Scanning Server DoS
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... " <http://www.f-secure.com/products/anti-virus/fsigk/> F-Secure Internet ... the Content Scanner Server. ... The vendor has been contacted and confirmed the existence of the problem ...
      (Securiteam)
    • [NEWS] TCLHttpd Contains Two Vulnerabilities (Directory Browsing, XSS)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... general-purpose Web server, and as a framework for building server ... Instructions for setting up the TclHttpd on your ... server context (Cross Site Scripting). ...
      (Securiteam)