TITLE: MailSite Express Attachment Upload Vulnerability SECUNIA ADVISORY ID: SA17240 VERIFY ADVISORY: http://secunia.com/advisories/17240/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote SOFTWARE: MailSite 6.x http://secunia.com/product/5898/ DESCRIPTION: Soroush dalili has discovered a vulnerability in MailSite Express, which can be exploited by malicious users to compromise a vulnerable system. The problem is that it is possible to upload attachments with an arbitrary file extension to a cache folder with a predictable name inside the web root. This can be exploited to upload and execute malicious script files (e.g. PHP and ASP scripts). The vulnerability has been confirmed in version 6.1.20. Other versions may also be affected. SOLUTION: Configure IIS to remove execution permissions for scripts in the "Web\Cache" directory. This will however not stop malicious users from uploading HTML documents containing malicious script code. Use another product. PROVIDED AND/OR DISCOVERED BY: Soroush dalili, Grayhatz security group ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------