[NT] Winmail Server Information Disclosure

From: SecuriTeam (support_at_securiteam.com)
Date: 12/22/04

  • Next message: SecuriTeam: "[UNIX] ChangePassword Unsafe Command Execution (make)"
    To: list@securiteam.com
    Date: 22 Dec 2004 14:09:48 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      Winmail Server Information Disclosure
    ------------------------------------------------------------------------

    SUMMARY

     <http://www.magicwinmail.net> Winmail Server is "an enterprise class mail
    server software system offering a robust feature set, including extensive
    security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail,
    LDAP, multiple domains, SMTP authentication, spam protection, anti-virus
    protection, SSL/TLS security, Network Storage, remote access, Web-based
    administration, and a wide array of standard email options such as
    filtering, signatures, real-time monitoring, archiving, and public email
    folders".

    Several scripts (chgpwd.php, domain.php and user.php) that come with
    Winmail Server have been found to disclose sensitive information on the
    remote hosts.

    DETAILS

    Vulnerable Systems:
     * Winmail Server version 4.0 (Build 1112)

    Exploit:
    Access the following URL: http://127.0.0.1:6080/admin/chgpwd.php, as an
    alternative you can try and access the following pages domain.php,
    user.php found under the same directory.

    Workaround:
    You can edit c:\windows\winmail_php.ini change:
    display_errors = On

    To
    display_errors = Off

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:gss_it@yahoo.com> GSS IT.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[UNIX] ChangePassword Unsafe Command Execution (make)"

    Relevant Pages

    • [NT] Magic Winmail Servers Multiple Vulnerabilities
      ... Get your security news from a reliable source. ... " Magic Winmail Server is an enterprise ... class mail server software system offering a robust feature set, ... The upload.php scripts allows a mail user to upload his/her email file ...
      (Securiteam)
    • [UNIX] Daydream BBS Format String Vulnerability
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... product allows attackers to exploit a format string vulnerability in the ... This bulletin is sent to members of the SecuriTeam mailing list. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [NEWS] L-Forum SQL Injection Vulnerability
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... arbitrary SQL commands by injecting them through user provided data. ... This bulletin is sent to members of the SecuriTeam mailing list. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [NT] Buffer Overrun in Talentsofts Web+
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... system service, any arbitrary code executed on the server would run in the ... The information in this bulletin is provided "AS IS" without warranty of any kind. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [UNIX] PHP Source Injection in osCommerce
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Would result in a directory listing of the current dierctory ... The information in this bulletin is provided "AS IS" without warranty of any kind. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)