Witaj Gościu! ( Zaloguj | Rejestruj )

Forum PHP.pl

 
Reply to this topicStart new topic
> [WebMail] <-- szukam
Officerrr
post 19.09.2002, 18:31:32
Post #1





Grupa: Zarejestrowani
Postów: 33
Pomógł: 0
Dołączył: 30.08.2002

Ostrzeżenie: (0%)
-----


Szukam dobrego webmaila na phpie i mysqlu, ktory bedzie chodzil na php 4.2.* z global variables na off, support dla imap`a i support dla wielu folderow. Najlepiej cos jak postaci (a moze ktos juz przerobil postaci by dzialalo bez global variables?)

Z gory thx za pomoc.


--------------------
--
[Linux Administrator]
Go to the top of the page
+Quote Post
hyper
post 19.09.2002, 21:10:05
Post #2





Grupa: Zarejestrowani
Postów: 207
Pomógł: 0
Dołączył: 7.03.2002
Skąd: Warszawa

Ostrzeżenie: (0%)
-----


Proponuje zajrzeć na stronę ze skryptami: http://php.pl/script.php. Między innymi są tam skrypty do obsługi poczty przez WWW, może
znajdziesz coś dla siebie.


--------------------
Tomasz Wasiluk
Polcode >> Szukamy programistów z pasją
Go to the top of the page
+Quote Post
Officerrr
post 19.09.2002, 23:39:27
Post #3





Grupa: Zarejestrowani
Postów: 33
Pomógł: 0
Dołączył: 30.08.2002

Ostrzeżenie: (0%)
-----


ok, dzieki obejrze, a co do jednego ze skryptow, Squirrel Mail 1.2.7, z dzisiejszego bugtraq:

Cytat
****Sorry if you receive two of these.****

DarC KonQuesT XSS Release-

Product: Squirrel Mail 1.2.7 - released June 21, 2002 (tested, others
possibly vulnerable)
Vendor: Squirrel Mail - Web: www.squirrelmail.org
Problem: Cross Site Scripting
Severity: Moderate
Operating System(s): Tested against Red Hat 7.3, all others vulnerable if
they are using this version of Squirrel.

Discovered: August 4, 2002
Vendor Notified: um...now?
Public Release: Now - September 10

Background:
Squirrel Mail is a webmail daemon that provides a HTTP mail interface using
php.

Release Notes:
   I **DID NOT** notify the developers (until now) because I am a lazy SoB
and my motivation is lacking (free lance, unpaid, bored guy). I kept putting
it off (notice discovery date and the release now) and now they've released
several newer versions (most recently 1.3.1), which I have not tested.
Because of the release(S) of the new versions and due to my gross
slothfulness, I've decided to do a direct public release. Also, for those of
you who know php, you should be able to fix this problem without much
trouble. Apologies to those who feel like they're getting screwed over by
this.

Problem:
   User input is not sanitized so execution of arbitrary code on a client
computer is possible through a Cross Site Scripting (XSS) hole while the
code executes under the domain of the site which the webmail is hosted at.
Similar holes exist in the following utilized scripts:
   addressbook.php
   options.php
   search.php
   help.php

_MAIN_ Exploit:
   The XSS hole I developed the most is in addressbook.php. I was able to
inject and execute javascript code and after opening the addressbook page
there was no indication that I had changed anything (after entering the HTML
comment tags to get rid of some hanging code that my javascript had made
text).

The URL I crafted for the exploit is as follows:

http://<VULNERABLE
SITE>.net/webmail/src/addressbook.php?"><script>alert(document.cookie)</scri
pt><!--

If you execute the code without the HTML comment tag on the end it leaves a
nasty hanging bit of HTML code which is a clear indication that something
has gone awry to many users (however some may ignore it as they don't
understand it).

_OTHER_ Holes:

1) This will reveal the path to php directory and other...maybe interesting
to someone, I didn't really care but decided to include it. The problem is
in options.php.

http://<VULNERABLE
SITE>.net/webmail/src/options.php?optpage=<script>alert('boop!')</script>

it returns the following on the page for the server I tested:
Fatal error: Failed opening required ''
(include_path='.:/php/includes:/usr/share/php') in
/var/www/squirrelmail/src/options.php on line 172

2) This is a XSS hole in search.php:

http://<VULNERABLE
SITE>.net/webmail/src/search.php?mailbox=<script>alert('boop!')</script>&wha
t=x&where=BODY&submit=Search

3) Another in search.php

http://<VULNERABLE
SITE>.net/webmail/src/search.php?mailbox=INBOX&what=x&where=<script>alert('b
oop!')</script>&submit=Search

4) XSS in help.php:

http://<VULNERABLE
SITE>.net/webmail/src/help.php?chapter=<script>alert('boop!')</script>

5) XSS in addressbook (different):
   Manually entered nicks, email addresses, first names, last names, and
info sections in the addressbook are not filtered so script can be placed
and executed through them the next time the page is viewed.

Vendor Action:
   I didn't notify....yeah yeah I know....

Aftermath:
   It seems to me this has all the normal dangers of a XSS hole so listing
them seems pointless (I'm sure we've all seen them). If someone expands this
idea to include other/larger possibilites I'd be interested in hearing about
it.
FINAL UPDATE - 9/10/02 I found what I believe is the main developer or head
guy's email address so I'm direct mailing him too. Maybe he can tell us if
the newer versions are fixed.

(---There was a section here about a quote from their page --Revision=
Konstantin ("Icon") Riabitsev informed me that MagicHTML has nothing to do
with this but with the protection of email viewed in HTML form...seriously
helliphino I didn't bother to look it up.  Thanks for the correction.--)

Later on, and have fun,

- DarC KonQuesT -(DiR)-
   Ringleader - DarC Horizons
   United States of America

Greets:
DarCLinG, V3ga, st3v3, Jenn, Christina, John (heh, you're next)

"Congress shall make no law abridging the freedom of sXXXch, or the right of
the people peaceably to XXXemble, and to peXXXion the government for a
redress of grievances." -- Marc Rotenberg




---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.377 / Virus Database: 211 - Release Date: 7/15/02


--------------------
--
[Linux Administrator]
Go to the top of the page
+Quote Post
Officerrr
post 21.09.2002, 19:11:39
Post #4





Grupa: Zarejestrowani
Postów: 33
Pomógł: 0
Dołączył: 30.08.2002

Ostrzeżenie: (0%)
-----


Wybralem Squirrel Mail 1.3.1 i dziala super

nadal nalegam by updejtnac ten w dziale skrypty przynajmniej na 1.2.8 bo 1.2.7 jest troche dziurawy.


--------------------
--
[Linux Administrator]
Go to the top of the page
+Quote Post
treewood
post 5.03.2003, 13:57:17
Post #5





Grupa: Zarejestrowani
Postów: 215
Pomógł: 0
Dołączył: 18.01.2003

Ostrzeżenie: (0%)
-----


mam pytanie właśnie związane ze SquirrelMail. Czy ma ktoś jakieś albo zna stronę gdzie są pluginy/schematy wyglądu SquirrelMail? Bo ogółnie wygląda bardzo prymitywnie i zamiast ładować się w dwóch ramkach wolałbym by ładowało się ładnie w tabelach.
Proszę o pomoc ...


--------------------
Działam w OpenSolution.org, autor Quick.Cms i Quick.Cart już od ponad 10 lat
Go to the top of the page
+Quote Post

Reply to this topicStart new topic
1 Użytkowników czyta ten temat (1 Gości i 0 Anonimowych użytkowników)
0 Zarejestrowanych:

 



RSS Wersja Lo-Fi Aktualny czas: 14.07.2025 - 21:06