Home / vulnerabilities NETRAGARD-20061206.txt
Posted on 22 December 2006
Source : packetstormsecurity.org Link
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************** Netragard, L.L.C Advisory* *******************
Strategic Reconnaissance Team
------------------------------------------------
http://www.netragard.com -- "We make I.T. Safe."
[POSTING NOTICE]
- ----------------------------------------------------------------------
If you intend to post this advisory on your web page please create a
clickable link back to the original Netragard advisory as the contents
of the advisory may be updated.
<a href=http://www.netragard.com/html/recent_research.html>
Netragard Research
</a>
[About Netragard]
- ----------------------------------------------------------------------
Netragard is a unique I.T. Security company whose services are
fortified by continual vulnerability research and development. This
ongoing research, which is performed by our Strategic Reconnaissance
Team, specifically focuses on Operating Systems, Software Products and
Web Applications commonly used by businesses internationally. We apply
the knowledge gained by performing this research to our professional
security services. This in turn enables us to produce high quality
deliverables that are the product of talented security professionals
and not those of automated scanners and tools. This advisory is the
product of research done by the Strategic Reconnaissance Team.
[Advisory Information]
- ----------------------------------------------------------------------
Contact : Adriel T. Desautels
Researcher : Philippe C. Caturegli
Advisory ID : NETRAGARD-20061206
Product Name : @ Mail
Product Version : 4.51
Vendor Name : Calacode
Type of Vulnerability : XSS with filter evasion technique.
Effort : Easy
- ----------------------------------------------------------------------
Netragard Security Note:
Source code obfuscation does not reduce the risk profile of any
application as it has no impact on vulnerabilities that might exist
within a particular application. @Mail code was obfuscated using basic
obfuscation techniques.
[Product Description]
- ----------------------------------------------------------------------
"@Mail is a feature rich Email Solution, providing a complete WebMail
interface for accessing email-resources via a web-browser or wireless
device."
- --http://www.atmail.com--
[Technical Summary]
- ----------------------------------------------------------------------
@Mail does not properly sanitize email. While @Mail does pre-append
a <DEFANGED_ tag to detected HTML tags, it does not properly detect
<SCRIPT/XSS> tags. This failure makes @Mail vulnerable to Cross-site
Scripting Attacks ("XSS") via filter evasion.
[Technical Details]
- ----------------------------------------------------------------------
@Mail renders HTML emails by default. (Note: we did not find a way to
disable this feature.) The emails that are received are parsed by the
following code located in Global.pm which disarms basic XSS attacks.
- -------8<------- SNIP Global.pm line 626 -> 635 SNIP -------8<-------
my ( $I1I11I11I11IIIII, $I1I111I1111II1II );$_ =
$I1111II1II1II1II->II1II1I11IIII111($I1I1II1II1I11II1);if (/</)
{s/<(META|APP|SCRIPT|OBJECT|EMBED|FRAME|IFRAME|BASE|BODY)(s|>)/<DEFANGED_$1$2/gi;
s/On(Abort|Blur|Change|Click|DblClick|DragDrop|Error|Focus|KeyDown|KeyPress|KeyUp|
Load|MouseDown|MouseMove|MouseOut|MouseOver|MouseUp|Move|Reset|Resize|Select|Submit|
Unload)/DEFANGED_On$1/gi;
}if (/["