---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: MailScan for Mail Servers Web Administration Interface Multiple Vulnerabilities SECUNIA ADVISORY ID: SA31534 VERIFY ADVISORY: http://secunia.com/advisories/31534/ CRITICAL: Moderately critical IMPACT: Security Bypass, Cross Site Scripting, Exposure of sensitive information WHERE: >From remote SOFTWARE: MicroWorld MailScan for Mail Servers 5.x http://secunia.com/product/19602/ DESCRIPTION: Oliver Karow has reported some vulnerabilities in MailScan for Mail Servers, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, and bypass certain security restrictions. 1) An input validation error within the web administration interface can be exploited to e.g. download arbitrary files via directory traversal attacks by sending specially crafted requests to the vulnerable service. 2) The web administration interface does not properly restrict access to certain pages. This can be exploited to bypass the authentication by e.g. accessing protected pages directly. 3) Input passed via the URL to the web administration interface is not properly sanitised before being returned to the user in case of an error. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected website. Successful exploitation may require that the user's browser does not URL-encode the request (e.g. Internet Explorer). The vulnerabilities are reported in MailScan for Mail Servers version 5.6.a with espatch1. Other versions may also be affected. SOLUTION: Do not browse other websites while being logged in to the web administration interface. Restrict access to trusted users only. PROVIDED AND/OR DISCOVERED BY: Oliver Karow ORIGINAL ADVISORY: http://www.oliverkarow.de/research/mailscan.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------