Hi,

F�r alle die mailman benutzen und kein Bugtraq lesen:
----------------------------------------------------------
hola,

Endymion�s (http://www.endymion.com) Sakemail and
Mailman have a classic file-disclosre vulnerability

Product:

Mailman - Webmailsystem (http://www.endymion.com)

Problem Description:

due to missing input-validation it is possible to read files with the
webservers (or mailmans) permissions
a similar (pretty much the same) bug was discovered 2 years ago from
"secureality"
(http://www.securereality.com.au/)/(http://online.securityfocus.com/archive/
1/149214).


Example:

a HTTP-request to:
http://hostname/cgi-bin/mmstdo*.cgi
with the following parameters:
USERNAME=
PASSWORD=
ALTERNATE_TEMPLATES= [relative FILE/PATH] [Nullbyte/0x00]

... will lead to disclosure of [FILE/PATH]




Summary:

object: mmstdo*.cgi (Perl Script)

class: Reffering to OWASP-IV (Input Validation Classes)

Directory Traversal (IV-DT-1)
http://www.owasp.org/projects/cov/owasp-iv-dt-1.htm
Null Character (IV-NC-1) http://www.owasp.org/projects/cov/owasp-iv-nc-1.htm

remote: yes
local: ---
severity: medium

vendor: hast been informed [got a ticket# from some automated reply .. but
nothing else]
patch/fix: ???
recomannded fix: sanitize meta-characters from user-input




[EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.websec.org

check out the Open Web Application Security project
http://www.owasp.org

Gru�
Thomas

----------------------------------------------------------------------------
PUG - Penguin User Group Wiesbaden - http://www.pug.org

Antwort per Email an