Release date:
Updated on:
Affected Systems:
Axigen Mail Server 8.x
Description:
--------------------------------------------------------------------------------
Bugtraq id: 56343
CVE (CAN) ID: CVE-2012-4940
Axigen Mail Server is a small Mail Server.
The View Log Files page of AXIGEN Mail Server 8.1.0 and other versions does not properly filter the Files in the Web request '.. \ ', which can cause attackers to browse, delete, and download system files on the server.
1) Pass the "fileName" parameter to index. heat (Set "page" to "vlf", "action" to "edit") and sources/logging/page_log_dwn_file.heat (Set "action" to "download ") is used to read the file. The directory traversal sequence can cause leakage and download of arbitrary files.
2) Pass the "fileName" parameter to index. note: If you set "page" to "vlf" and "action" to "delete", you can delete an object by means of directory traversal, this vulnerability can cause leakage and download of arbitrary files.
To successfully exploit this vulnerability, you must access the "Logging" module.
<* Source: Zhao Liang
Link: http://secunia.com/advisories/51118/
Http://www.kb.cert.org/vuls/id/586556
Http://cwe.mitre.org/data/definitions/22.html
*>
Suggestion:
--------------------------------------------------------------------------------
Temporary solution:
If you cannot install or upgrade the patch immediately, NSFOCUS recommends that you take the following measures to reduce the threat:
* Only trusted hosts and networks can be connected.
Vendor patch:
Axigen
------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.axigen.com/