ExtMail was initially based on the WebMail software. Later, it gradually improved its supporting facilities and formed the ExtMail mail system, providing complete SMTP/POP/IMAP/Web and management support. Currently, more than 20 thousand machines are installed.
Extmail is a widely deployed open-source webmail system. However, this system has several problems in handling emails and other details, as a result, attackers can attack users using this webmail, obtain access to the mail account, or directly change the password.
Detailed description:
1. The sid in the cookie is the only user logon credential. You can obtain the sid to log on to the target email address. This is not a vulnerability. It only describes the use of the following problems. Www.2cto.com
2. Information Leakage
Http://demo.extmail.org/extmail/cgi/env.cgi
3. the email body and attachments have the xss vulnerability.
4. xss exists in the address book and so on
6. After logon, you can obtain the mailbox Security Questions and answers for changing the password.
Send xss emails, get sid, log on, get mailbox Security Questions and Answers, Change Password ,,,
Proof of vulnerability:
1. Body iframe
2. Attachment
3. Address Book
4. Information Leakage
5. Security Issues
Solution:
I will not be ugly if you are professional.
Author: unic02n