Bugtraq mailing list archives
Re: PCL-0001: Remote Vulnerability in HORDE MTA < 2.2.4
From: "Ricardo J. Ulisses Filho" <ricardoj () hotlink com br>
Date: Fri, 15 Aug 2003 12:35:25 -0300
Hi, I've made some tests here and could reproduce the same vulnerability behaviour described in your advisory. Reading about session handlers, in php.ini, there is an option called "session.use_only_cookies", that, if set, avoids such sort of attack which involves passing session ids in URLs. Unfortunately, this option is not used by most default php.ini configurations. Regards, -- Ricardo J. Ulisses Filho _____________________________ ricardoj () hotlink com br System Administrator HOTlink Internet - Recife / PE / Brazil On Wednesday 13 August 2003 18:26, Vincenzo 'puccio' Ciaglia wrote:
--------------------------- PUCCIOLAB.ORG - ADVISORIES <http://www.pucciolab.org> --------------------------- PCL-0001: Remote Vulnerability in HORDE MTA < 2.2.4 --------------------------------------------------------------------------- PuCCiOLAB.ORG Security Advisories puccio () pucciolab org http://www.pucciolab.org Vincenzo 'puccio' Ciaglia August 12th, 2003 --------------------------------------------------------------------------- Package : Horde MTA Vulnerability : access to private account without login Problem-Type : remote Version : All < 2.2.4 Official Site : http://horde.org/ N° Advisories : 0001 *********************** Description of problem ************************ An attacker could send an email to the victim who ago use of HORDE MTA in order to push it to visit a website. The website in issue log all the accesses and describe in the particular the origin of every victim. Example: ------------------- MY STAT FOR MY WEBSITE - REFERENT DOMAIN HTTP://MYSITE.MYSOCIETY.NET/HORDE/IMP/MESSAGE.PHP?HORDE=FC235847D2C8A88190C 879B290D12630&INDEX=XXX In this example, the victim has visualized our website reading the mail that we have sent to it. Visiting the link marked from our counter of accesses, we will be able to approach the page of management of the mail of the victim and will be able to read and to send, calmly, its email without to make the login.The session comes sluice after approximately 20 minutes and the hacker it has the time to make its comfortable ones. ************************* What could make a attacker? ************************* Read, write and fake your e-mail. Could send , from you email address, a mail to your ISP and ask it User e PASS of your website.The consequences would be catastrophic ************************* What I can do ? ************************* Upgrade your MTA Agent to 2.2.4 version. Greet, Vincenzo 'puccio' Ciaglia www.pucciolab.org
Current thread:
- PCL-0001: Remote Vulnerability in HORDE MTA < 2.2.4 Vincenzo 'puccio' Ciaglia (Aug 13)
- Re: PCL-0001: Remote Vulnerability in HORDE MTA < 2.2.4 Ricardo J. Ulisses Filho (Aug 15)