CVE-2004-2547
CVSS2.6
发布时间 :2004-12-31 00:00:00
修订时间 :2008-09-05 16:44:26
NMCOES    

[原文]NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to obtain sensitive information via HTTP requests that (a) specify the / URI, (b) specify the /scripts/ URI, or (c) specify a non-existent file, which reveal the path in an error message.


[CNNVD]NetWin SurgeMail/WebMail多个输入验证漏洞(CNNVD-200412-148)

        
        NetWin SurgeMail/WebMail是基于WEB的邮件服务程序。
        NetWin SurgeMail/WebMail多处不正确处理用户提供数据,远程攻击者可以利用这个漏洞获得敏感路径信息和进行跨站脚本攻击。
        提交不存在的文件请求会导致敏感信息泄露,而对程序监听的7080端口,对恶意HTML字符缺少充分过滤,可导致跨站脚本攻击,泄露敏感信息。
        

- CVSS (基础分值)

CVSS分值: 2.6 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:netwin:surgemail:1.8b3
cpe:/a:netwin:surgemail:1.2b
cpe:/a:netwin:surgemail:1.4a
cpe:/a:netwin:surgemail:1.1b
cpe:/a:netwin:surgemail:1.6d
cpe:/a:netwin:surgemail:1.5d
cpe:/a:netwin:surgemail:1.8d
cpe:/a:netwin:surgemail:1.6b
cpe:/a:netwin:surgemail:1.5c
cpe:/a:netwin:surgemail:1.5a
cpe:/a:netwin:surgemail:1.2c
cpe:/a:netwin:surgemail:1.3b
cpe:/a:netwin:surgemail:1.1a
cpe:/a:netwin:surgemail:1.8g3
cpe:/a:netwin:surgemail:1.3l
cpe:/a:netwin:surgemail:1.3a
cpe:/a:netwin:surgemail:1.3i
cpe:/a:netwin:surgemail:1.7b3
cpe:/a:netwin:surgemail:1.6e2
cpe:/a:netwin:surgemail:1.1c
cpe:/a:netwin:surgemail:1.5b
cpe:/a:netwin:surgemail:2.0a2
cpe:/a:netwin:surgemail:1.1d
cpe:/a:netwin:surgemail:1.7a
cpe:/a:netwin:surgemail:1.3k
cpe:/a:netwin:surgemail:1.3j
cpe:/a:netwin:surgemail:1.6e
cpe:/a:netwin:surgemail:1.4b
cpe:/a:netwin:surgemail:1.3g
cpe:/a:netwin:surgemail:1.3a_rc1
cpe:/a:netwin:surgemail:1.8a
cpe:/a:netwin:surgemail:1.9b2
cpe:/a:netwin:surgemail:1.0d
cpe:/a:netwin:surgemail:1.0c
cpe:/a:netwin:surgemail:1.3c
cpe:/a:netwin:webmail:3.1d
cpe:/a:netwin:surgemail:1.5f
cpe:/a:netwin:surgemail:1.2a
cpe:/a:netwin:surgemail:1.6a
cpe:/a:netwin:surgemail:1.4c
cpe:/a:netwin:surgemail:1.3e
cpe:/a:netwin:surgemail:1.3d
cpe:/a:netwin:surgemail:1.3f
cpe:/a:netwin:surgemail:1.3h
cpe:/a:netwin:surgemail:1.5d2
cpe:/a:netwin:surgemail:1.8e

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2547
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2547
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-148
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/16319
(PATCH)  XF  surgemail-invalid-path-disclosure(16319)
http://www.securityfocus.com/bid/10483
(PATCH)  BID  10483
http://www.osvdb.org/6745
(PATCH)  OSVDB  6745
http://www.netwinsite.com/surgemail/help/updates.htm
(PATCH)  CONFIRM  http://www.netwinsite.com/surgemail/help/updates.htm
http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt
(PATCH)  MISC  http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt
http://secunia.com/advisories/11772
(VENDOR_ADVISORY)  SECUNIA  11772
http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0056.html
(PATCH)  FULLDISC  20040603 Surgemail - Multiple Vulnerabilities

- 漏洞信息

NetWin SurgeMail/WebMail多个输入验证漏洞
低危 输入验证
2004-12-31 00:00:00 2005-12-09 00:00:00
远程  
        
        NetWin SurgeMail/WebMail是基于WEB的邮件服务程序。
        NetWin SurgeMail/WebMail多处不正确处理用户提供数据,远程攻击者可以利用这个漏洞获得敏感路径信息和进行跨站脚本攻击。
        提交不存在的文件请求会导致敏感信息泄露,而对程序监听的7080端口,对恶意HTML字符缺少充分过滤,可导致跨站脚本攻击,泄露敏感信息。
        

- 公告与补丁

        厂商补丁:
        NetWin
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        NetWin Upgrade SurgeMail 2.0c
        ftp://ftp.netwinsite.com/pub/surgemail/beta/

- 漏洞信息 (24176)

NetWin SurgeMail 1.8/1.9/2.0,WebMail 3.1 Error Message Path Disclosure (EDBID:24176)
php webapps
2004-06-07 Verified
0 Donnie Werner
N/A [点击下载]
source: http://www.securityfocus.com/bid/10483/info

SurgeMail/WebMail is prone to multiple vulnerabilities. These issue result from insufficient sanitization of user-supplied data. The issues can allow an attacker to carry out path disclosure and cross-site scripting attacks.

SurgeMail versions 1.9 and prior and WebMail 3.1d are affected by these issues. 

http://www.example.com/[non-existant request]		

- 漏洞信息

6745
SurgeMail/WebMail Error Message Path Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

NetWin's SurgeMail and WebMail contain a flaw that may lead to an unauthorized information disclosure.  The issue is triggered when no arguments or a non-existant file are provided to various HTTP requests, which will disclose the physical server path resulting in a loss of confidentiality.

- 时间线

2004-06-03 2003-05-16
2004-06-03 Unknow

- 解决方案

Upgrade to SurgeMail version 2.0c, WebMail version 3.1e, or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

NetWin SurgeMail/WebMail Multiple Input Validation Vulnerabilities
Input Validation Error 10483
Yes No
2004-06-07 12:00:00 2004-06-07 12:00:00
Discovery is credited to Donnie Werner of exploitlabs <morning_wood@exploitlabs.com>.

- 受影响的程序版本

NetWin WebMail 3.1 d
NetWin SurgeMail 2.0 a2
NetWin SurgeMail 1.9 b2
NetWin SurgeMail 1.9
NetWin SurgeMail 1.8 g3
NetWin SurgeMail 1.8 e
NetWin SurgeMail 1.8 d
NetWin SurgeMail 1.8 b3
NetWin SurgeMail 1.8 a
NetWin SurgeMail 2.0 c

- 不受影响的程序版本

NetWin SurgeMail 2.0 c

- 漏洞讨论

SurgeMail/WebMail is prone to multiple vulnerabilities. These issue result from insufficient sanitization of user-supplied data. The issues can allow an attacker to carry out path disclosure and cross-site scripting attacks.

SurgeMail versions 1.9 and prior and WebMail 3.1d are affected by these issues.

- 漏洞利用

No exploit is required.

The following proof of concept is available:
http://www.example.com/[non-existant request]
http://www.example.com:7080/<script>alert(document.cookie)</script>

- 解决方案

SurgeMail 2.0c is available to address this issue:


NetWin SurgeMail 1.8 d

NetWin SurgeMail 1.8 e

NetWin SurgeMail 1.8 g3

NetWin SurgeMail 1.8 a

NetWin SurgeMail 1.8 b3

NetWin SurgeMail 1.9 b2

NetWin SurgeMail 1.9

NetWin SurgeMail 2.0 a2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站