polymail.io PPI Scanner /Insecure -IIS 7.5/Source Code Information Disc.

Risk: Medium
Local: Yes
Remote: Yes
CWE: CWE-359

Security Advisory #Title: polymail.io PPI Scanner /Insecure- Microsoft-IIS 7.5/Source Code Information Disclosure and MORE...MORE MORE Time-Line Vulnerability ----------------------- 12-11-2018 First Contact 15-11-2018 Second Contact Response but the response is not the cybersecurity Team.. They had me a new email for contact to security team 15-12-2018 Security Team response "ll your Polymail account information is stored securely and only the absolutely necessary components of the macOS app and iOS app have access to it...and this app it's for operative systems that the bugs not affect ¿WHAT THE FUCK? 21-11-2018 I responsed that this is the code of Web App and the bugs could be affected 28-11-2018 No Response 29-11-2018 I verified that the same bugs exist still... Then 5-12-2018 Full Disclosure VULNERABILITY------------------------- #Title: polymail.io PPI Scanner /Insecure- Microsoft-IIS 7.5/Souce Code Disclosure #Vendor: polymail.io #Author:Juan Carlos García (@secnight) #Follow us @secnight Author:Juan Carlos García #@Habemuscurso DESCRIPTION 1 Polymail.io PPI Scanner Initial release July 20, 2016; 2 years ago Platform OS X, iOS Polymail is an email application for OS X and iOS known for its clean interface and additional features atop the Gmail platform. It publicly released in July 2016.rs.olymail adds several new features atop those associated with standard email. Its email tracking shows which recipients have received and opened the email.[1] Users can also set reminders for when to follow up on an email and schedule when they want their emails to send, if not immediately. T he app also holds emails briefly so that users can "undo send".[2] Polymail will also show profiles for the user's recipients and senders by associating those email addresses with those used in other social network services PROOF OF CONCEPT 2 PPI Scanner Description The response contains Personally Identifiable Information, such as CC number, SSN and similar sensitive data. URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 4012397152215206 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 2584593123125514 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 3500500278278500 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 5222295145143894 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 5637474537306473507 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 4445564443335005 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 6507221514343513 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 5041622951430538851 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 4514389478226507 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 5143053885142394 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 5564445564443335 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 4722646552752825 URL https://polymail.io/downloads/dpa.pdf Method GET Evidence 3513514514335250 Instances 13 Solution Other information Credit Card Type detected: Visa Reference CWE Id 359 WASC Id 13 Source ID 3 3 Insecure- Microsoft-IIS 7.5/ Description Based on passive analysis of the response, the insecure component Microsoft-IIS 7.5 It seems to be in use. The highest known CVSS rating for the version of this product is 10 In total,5 vulnerabilities have been recovered and analyzed Method GET Evidence Microsoft-IIS/7.5 Instances 1 Solution Update from Microsoft-IIS 7.5 to the latest stable version of the product. Use a package manager and package management policies and Procedures for managing installed versions of software packages Other information CVE: CVE-2010-3972 CVSS: 10.0 CVE: CVE-2010-2730 CVSS: 9.3 CVE: CVE-2010-1256 CVSS: 8.5 CVE: CVE-2010-1899 CVSS: 4.3 CVE: CVE-2012-2531 CVSS: 2.1 References http://www.cvedetails.com/cve-details.php?cve_id=CVE-2010-3972 http://www.cvedetails.com/cve-details.php?cve_id=CVE-2010-2730 http://www.cvedetails.com/cve-details.php?cve_id=CVE-2010-1256 http://www.cvedetails.com/cve-details.php?cve_id=CVE-2010-1899 http://www.cvedetails.com/cve-details.php?cve_id=CVE-2012-2531 CWE Id 829 WASC Id 42 VERY IMPORTANT: In these moemtos I strongly discourage the use of this mail interface for IOS and MacOsx to have failures that include the database, where only Mac and IOS users will be. This email has application so you should not have waited so long because there is an APP for this company. The attack techniques that can be performed from the website to the mobile App are possible for a malicious user UNTIL THE BUGS ARE FIXED,DON´T USE THIS APPLICATION THE DANGER HAS A SCORING 9/10 (Nist) The tests to the telephone applications are ending now and from a printf () to try have shell ... 3 Source Code Disclosure - PHP ------------------------------------ Description The source code of the application was disclosed by the web server - PHP Source ID 3 Desscription The source code of the application was disclosed by the web server - PHP URL https://polymail.ior/edgedl/widevine-cdm/ 28&mn=sn-h5q7dned&ms=nvh&mt=1543951177&mv=m&pl=21&shardbypass=yes Method GET /<Real Example< Evidence <?=\x0004XnGoJ \x0000 5T9W\x0015\x0016\x000fpH \x0016}VI\x001c<bH~f\x0001\x0016=HIy\x0008 \x0014TP}D\x0017O4\x0002pT\x000f{:\x001f@wf\x0016\x001a8@\x0006l\x0015\x0017*\x0018I\x001f6t+Z\x0004! \x0014"Y{0I8\x001f\x0019 \x0017p I'> 6?\x0011lV\x000b/\x001aTN;\x000e1Duw@@{pA)\x0003\x000eyn\x0008o\x0013\ x00132\x00185z\x0018\x001e6\x0011\x0007[\x0007L\x001bC?L\x0000~J{JM\x001bh\x000bYIi\x00084)\G|\x0004\x0012p ^p #e\x000c}Xj8pTld:\x000e@\x0005\A\x001ap\x0018{w7*ttFDYP\x0012Tr,hp.cU{92;djl\x001c(|\x0005,U&\Z` GPo\x0004gHZ^w/\x0018 \x001aqJC\x0019\x00056EkE\x001dpW~y\x0011B$\x0007?PR*\x0013 cz]Y%\x001656\x0002^ \x0013uK9G&:\x0017y\x0017{\x0006\x0004\x0017u3\x001e9\x000fR, T7{o8n(D#mH+\x0012ap\x0014tqFV\x00114W\ x0017J4\x0005K\x0007/m\x0018nx*1_&q\x0011\x0007e;zP|\x001d\x0006)]M7%`;+Am{S9\x0010WnbX\x000b0@\ x000eT\x0004v\x0005\x0019Oa3f\x0010 4wr}]\x0000[/jpuz$8Qm4%\x0000Z{*5Q_{8LIU [HP\x0017\x0004 XVz$<07\ x0012Pg`Ih\x000c#R&\x00181d\x001f*\x0001jj8]\x0014zN\x0013A\x0018v9~m~\x0002bzg\x0010O>\x0001[b'\x000b{\x 000f=H]s2H!7p:\x0010\x00194q\x0010WZ\x0016\x0013D \x0000 OY\x0013T\x0019AU&fT}\x 0001o\x00158='8'\x0015x\x001d\x0001g\x0014\x0010lZ\x0003\x001fo\x0001q\x0007q\x001a%a's{9a0\x00151&U3"\ x0017m\x0001\x000c*XxZ*3O"\x0013\x001c9t%w\x0016\x000e\x001603@tSf`qx1\x0006 \x001d"x\x000f\x0016i\EYAvs /\x001aV\x0017\F`\x001e\x0001GB\x0015y3xa }gJ(L!\x00120\x0015A\x0013NS &=G1vC\x000f\x0011sU[w3s\x0012N\x0019OD\x0012V? \\x0008FoG Hk%->\x000b1l'9t[\\x001fEu\x0004\x0015\x0014T\x0007\x001cD\x0016n}q0yo\x000bzpo\x0007`\x0017.\ x0003yqK~\x0014I?TPf]YA&\x0012\x0003x!\x0018\x0016{AGp\x00145&tP\x0013R}*\x000bf>E?\x001bErY>l[r X {(\x0002Dj40\x000c[\x000b\x0010 o`$6'@t9:`$\x001cPo\x0003\x0011=j>*i\x001e19(Ip8wLzX<p\x0019vE}\x0002 /(Iz\x0015V5W\x0008oO\x0015Q\x001ain9y:\x001a\x0014\x000fX\x001eA:m/`$\x0002K*K\x000c:\x0000X1@\ x001b'b5.\x000c_\x0015\x00134V&Mm;k4f\x0014*{bz>\x000b\x0007Hz \x000eqbanf'h\x0004}ob^ M=E \x000eXUAC\x001a\x0017$k\x0014\x0003_7\x001c}J\x000e\x0011MRlg\x000e\x0002:&U\ x0007KtI\x0018\x001a\x000cy?3:S8\x0011\x001e!A-Z4Pf\x00170\x00088YrD\x0019~ ETC Too Many long Solution Instance 1 Make sure that the Source Code application is not enabled withalternative extensions, and make sure that the source code does not is present within other files or data displayed to the web server,or served by the web server. IV. CREDITS------------------------- This vulnerability has been discovered by Juan Carlos García (@secnight) VII. LEGAL NOTICES------------------------- The Author accepts no responsibility for any damagecaused by the use or misuse of this informat

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com


Back to Top