[21405] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Cobalt Cube Webmail directory traversal

daemon@ATHENA.MIT.EDU (Paul Marshall)
Mon Jul 9 13:22:31 2001

Message-Id: <5.1.0.14.2.20010709120649.02c16d98@127.0.0.1>
Date: Mon, 09 Jul 2001 12:10:05 +0100
To: bugtraq@securityfocus.com
From: Paul Marshall <paul@roninstorm.freeserve.co.uk>
In-Reply-To: <3B441A3E.D484EF1A@snosoft.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed

At 08:41 05/07/2001, you wrote:
 >I just got a new Cobalt Cube today and I have been poking around at it
 >for security issues... I noticed this minor issue in the webmail system.
 >Your
 >users are not aloud to have shell access by default however if they
 >malform their mailbox requests they can read local files with the perms
 >of the webserver. If your users have shell access they will not really
 >be gaining anything however this could be used to remotely gather
 >information for a future attack.
 >
 >[admin admin]$ uname -a
 >Linux cube.ckfr.com 2.2.16C7 #1 Fri Sep 8 15:58:03 PDT 2000 i586 unknown
 >[admin admin]$ cat /etc/issue
 >
 >Cobalt Linux release 6.0 (Carmel)
 >Kernel 2.2.16C7 on an i586
 >
 >http://YOURCOBALTBOX:444/base/webmail/readmsg.php?mailbox=../../../../../../
 >../../../../../../../../etc/passwd&id=1
 >
 >-KF

Well caught.  I'll confirm the fault with my Cobalt Qube3's running the 
latest patches that their BlueLinq provides.  Surprising, to say the 
least.  You'd think they'd not allow traversal outside of your home 
directory...

	Paul


home help back first fref pref prev next nref lref last post