by r0t,der4444,cembo,VietMafia

Friday, April 28, 2006

Kmail <=2.3 vuln.

###############################################
Vulnerability discovered by : r0t
Date: 28 april 2006
vendorlink:www.webofall.com/displaynews.php?id=4
affected versions:2.3 and prior
###############################################


Vuln. Description:


1. Multiple Cross-Site Scripting attack vulnerabilities.

Kmail contains a flaws that allows a remote cross site scripting attack. Those flaws exists because input passed to "id" paremeter in "main.php" and input passed to "ordner" paremeter in "main.php","webdisk.php" and input passed to "draft" paremeter in "compose.php" and input passed to "m","y" paremeter in "calendar.php" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.


examples:

/main.php?action=showmail&id=[XSS]&bmsession
=b77f6a49569a0e6e2d35a8c14cd3ace2

/main.php?ordner=[XSS]&bmsession=1f2a3aeb01f
d5253be322a704e53469f

/compose.php?bmsession=1f2a3aeb01fd5253be32
2a704e53469f&draft=[XSS]

/webdisk.php?bmsession=1f2a3aeb01fd5253be32
2a704e53469f&ordner=[XSS]

/calendar.php?action=viewMonth&m=[XSS]&y=200
6&bmsession=1f2a3aeb01fd5253be322a704e53469f

/calendar.php?action=viewMonth&m=5&y=[XSS]&b
msession=1f2a3aeb01fd5253be322a704e53469f



2.Full Path Disclosure.

example:

/calendar.php?d=[CODE]&m=&y=&bmsession=5825
d89388de35f8f65ec106c6e3537b


###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew