[38609] in bugtraq
[Hackers Center Security Group] Sqwebmail Http Splitting
daemon@ATHENA.MIT.EDU (Zinho)
Tue Apr 26 16:59:50 2005
Date: 25 Apr 2005 21:34:10 -0000
Message-ID: <20050425213410.13635.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Zinho <zinho@hackerscenter.com>
To: bugtraq@securityfocus.com
Hackers Center Security Group (http://www.hackerscenter.com/)
Zinho's Security Advisory
Desc: Http Splitting leads to email account stealing
Product: SQWebmail
Risk: High
A dangerous http splitting attack can be taken against mailboxes that use Sqwebmail as web mail interface. Anyone can send a malformed link in the email body and stealing session cookie and passwords.
Proof of concept:
///
sqwebmail?redirect=%0d%0a%0d%0a[INJECT SCRIPT]
///
Vendor should patch this issue soon as anyone can attack a user directly.
Author:
Zinho is webmaster and founder of http://www.hackerscenter.com ,
Security research portal
Secure Web Hosting Companies Reviewed:
http://www.securityforge.com/web-hosting/secure-web-hosting.asp
zinho-no-spam @ hackerscenter.com