Skip to content

Instantly share code, notes, and snippets.

@tonykuo76
Last active October 28, 2019 01:52
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save tonykuo76/ed1cc21cf755bfb8b67ca24f50bded13 to your computer and use it in GitHub Desktop.
Save tonykuo76/ed1cc21cf755bfb8b67ca24f50bded13 to your computer and use it in GitHub Desktop.
Openfind MAIL2000 Webmail Pre-Auth Open Redirect.md

Openfind MAIL2000 Webmail Pre-Auth Open Redirect

Current Description

An Open Redirect vulnerability for all browsers in MAIL2000 through version 6.0 and 7.0, which will redirect to a malicious site without authentication. This vulnerability affects many mail system of governments, organizations, companies and universities.

Details

The injection point is ACTION parameter in "/cgi-bin/go".

We execute arbitrary code via ACTION paramemer without authentication.

Description

It could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.

Affected files

http://[Target Domain]/cgi-bin/go

Contributor

  • Tony Kuo (CHT Security)
  • Vtim (CHT Security)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment