Neon WebMail for Java 'downloadfile servlet' 目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111089 漏洞类型 路径遍历
发布时间 2006-09-20 更新时间 2006-09-23
CVE编号 CVE-2006-4955 CNNVD-ID CNNVD-200609-400
漏洞平台 JSP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/28605
https://www.securityfocus.com/bid/84199
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200609-400
|漏洞详情
NeonWebMailforJava5.08之前版本的downloadfileservlet中存在目录遍历漏洞,远程攻击者可以通过(1)savefolder和(2)savefilename参数(该参数中包含..)序列读取任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/20109/info

Neon WebMail is prone to multiple input-validation vulnerabilities because it fails to sanitize user-supplied input. These issues include:

- an arbitrary-file-upload vulnerability
- an arbitrary-email-manipulation vulnerability
- multiple SQL-injection vulnerabilities
- an unauthorized-access vulnerability
- multiple directory-traversal vulnerabilities
- an HTML-injection vulnerability. 

An attacker can exploit these issues to compromise the affected application.

Versions 5.06 and 5.07 (build.200607050) are vulnerable to these issue; prior versions may also be affected.

http://www.example.com/neonwebmail/downloadfile?filename=filename.ext&savefolder=[traversal]&savefilename=[traversal]
|参考资料

来源:BID
名称:20109
链接:http://www.securityfocus.com/bid/20109
来源:MISC
链接:http://vuln.sg/neonmail506-en.html
来源:SECUNIA
名称:22029
链接:http://secunia.com/advisories/22029
来源:XF
名称:neonwebmail-multiple-directory-traversal(29090)
链接:http://xforce.iss.net/xforce/xfdb/29090