what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

phpxmail.txt

phpxmail.txt
Posted Jul 7, 2005
Authored by Stefan Lochbihler

PHPXMAIL versions 0.7 through 1.1 suffer from an authentication bypass flaw that allows anyone to login by supplying an overly long password.

tags | advisory
SHA-256 | 2ef490981e3f4aa13f83c7d67ee73a193584e5cd0cb408b9e4582be4b4ffae7c

phpxmail.txt

Change Mirror Download
Author:    Stefan Lochbihler
Date: 6. Juli 2005
Affected Software: PHPXMAIL
Software Version: 0.7 -> 1.1
Software URL: http://phpxmail.sourceforge.net/
Attack: Authentication Bypass



Overview:
PhpXmail is a web based management software for the Xmail mail server
written in php.
It's main usage is as a GUI (Graphic User Interface) to the Xmail
administration extensions.
It allows the administrator of the mail server to perform configuration
management and
monitoring tasks for the mail server.
It allows the postmaster for each domain the Xmail server is configured to
perform management functions.
It allows the users who have a mail account to manage their account
settings.


Hi there !

Details:
When we try to log in with a username and a wrong password the server
response with a message like: -00024 invalid password.
When we take a look at the code below we see that the function check if
the first character is a "-".
For this case the function return false and exit.


code: class.xmail.php
if ($ret[0] == '-') { // not logged in
$this->xm_err_msg = $ret; // get error msg
return FALSE;
echo "$ret";
die;
exit;
}


The problem occurs when we try to log in with an overlong password
because we get no response message from the server and the function dont
exit.

Now when we login with a username like postmaster@localhost and an
overlong password
we bypass the error handler and successfully log in.


code: from login.inc

default:
$mail_server->xm_ctrl_p = xmdecrypt($servers["$form_server"][3]);
$logged_in = $mail_server->userauth($mail_server->xm_user_d,
$mail_server->xm_user_u, $mail_server->xm_user_p);
break; /* here we try to log in */

if ($logged_in != "The operation completed successfully.")
$_SESSION['mail_server'] = $mail_server;
$_SESSION['logged_in'] = $logged_in; /* take a look at the
session vars */



Vendor Status: The Vendor is informed !

Solution: Maybe insert a maxsize tag to the passwords input field.



Discovered by Steve





--
Erstellt mit Operas revolutionärem E-Mail-Modul: http://www.opera.com/m2/
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close