[39467] in bugtraq

home help back first fref pref prev next nref lref last post

Re: PHPXMAIL - Authentication Bypass

daemon@ATHENA.MIT.EDU (security@surefoot.com)
Wed Jul 6 21:16:17 2005

From: security@surefoot.com
To: bugtraq@securityfocus.com
Date: Wed, 6 Jul 2005 14:04:10 -0600
Cc: Steve <steve01@chello.at>
In-Reply-To: <op.sth6tcfgwosoee@www.xion.at>
MIME-Version: 1.0
Content-Type: text/plain;
  charset="iso-8859-15"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: <200507061404.11649.security@surefoot.com>

Hi Steve

On Wednesday 06 July 2005 11:57, Steve <St> wrote:
> Author:  	Stefan Lochbihler
> Date:    	6. Juli 2005
> Affected 	Software: PHPXMAIL
> Software 	Version: 0.7 -> 1.1
> Software 	URL: http://phpxmail.sourceforge.net/
> Attack:  	Authentication Bypass

[...details snipped...]

> The problem occurs when we try to log in with an overlong password 
> because we get no response message from the server and the function dont
> exit.
>
> Now when we login with a username like postmaster@localhost and an
> overlong password
> we bypass the error handler and successfully log in.

[...]

> Solution: Maybe insert a maxsize tag to the passwords input field.
>
>
>
> Discovered by Steve

Erm... a maxsize tag will not prevent the attack at all.

J

-- 
There is no such thing as fortune.  Try again.

home help back first fref pref prev next nref lref last post