Skip to content

Instantly share code, notes, and snippets.

@tonykuo76
Last active October 28, 2019 01:52
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save tonykuo76/95638395e0c83e68dbd3db0fa0184e27 to your computer and use it in GitHub Desktop.
Save tonykuo76/95638395e0c83e68dbd3db0fa0184e27 to your computer and use it in GitHub Desktop.
Openfind MAIL2000 Webmail Pre-Auth Cross-Site Scripting

Openfind MAIL2000 Webmail Pre-Auth Cross-Site Scripting

Current Description

The "/cgi-bin/go" page in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via ACTION parameter without authentication. The code can executed for any user accessing the page. This vulnerability affects many mail system of governments, organizations, companies and universities.

Details

The injection point is ACTION parameter in "/cgi-bin/go".

We execute arbitrary code via ACTION paramemer without authentication.

Description

We can execute arbitrary code without authentication.

Affected files

http://[Target Domain]/cgi-bin/go

Contributor

  • Tony Kuo (CHT Security)
  • Vtim (CHT Security)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment