David Rees zei:
> Marc Groot Koerkamp said:
>
>>> http://www.securityfocus.com/bid/7952
>>
>> Ok I inpected the exploit and in SM 1.4 the exploit isn't there. I don't
>> have SM 1.2.x anymore so i didn't check the older versions.
>>
>> The exploit had to do with setting move_messages GET vars. Current
>> Squirrelmail versions retrieve those vars through POST so the
>> vulnarability dissapeared.
>
> Hi Marc,
>
> I just tested the following on a 1.4.0 setup here:
>
> http://www.example.com/src/read_body.php?mailbox=/etc/passwd&passed_id=1&;
>
> It spit out the /etc/passwd file just fine.  You do have to be logged in,
> though.
>

OK, my mistake, I thought it had to do with deleting mailboxes.

I couldn'r reproduce it on Cyrus.

Probably it has to do with the fact that the imap server returns the
content of the non valid mailbox when it tries to select the mailbox.

This seems like an imap-server vulnarability and I guess it's UW.

This means that when I do a telnet session to the imap server I can
achieve the same.

I'm not sure it's up to SM to fix this because if we fix it ( == not
returning imap server messages in case of NO responses ) users can still
access /etc/passwd by a simple telnet session.

But please give more information about the form of the returned
/etc/passwd file. In other words, is it the imap-server message in case of
a NO response.

Regards,

Marc Groot Koerkamp.


-------------------------------------------------------
This SF.Net email is sponsored by: INetU
Attention Web Developers & Consultants: Become An INetU Hosting Partner.
Refer Dedicated Servers. We Manage Them. You Get 10% Monthly Commission!
INetU Dedicated Managed Hosting http://www.inetu.net/partner/index.php
--
squirrelmail-users mailing list
List Address: [EMAIL PROTECTED]
List Archives:  http://sourceforge.net/mailarchive/forum.php?forum_id)95
List Info: https://lists.sourceforge.net/lists/listinfo/squirrelmail-users

Reply via email to