Directory Disclose,Email Disclose Zendmail vulnerability
P
Paragon Initiative Enterprises
Submitted None
Actions:
Reported by
test_this
Vulnerability Details
Technical details and impact analysis
i found three vulnerability
Directory information disclose,Email address disclose, and possible Remote code execution in Zendmail
during signup your code accept username with ',",/,@ while all of the special character must be forbidden or encoded in username
Directory Disclose:
______________________
1. goto sign-up page and create a account with username with double quote like as"
2. signin and goto ur account and add email address, then logout
3.goto Forgot-Password section and enter username of above ( as" )
4.and see full path of server has been disclose (screenshot: directory.png)
Email address Disclose
_________________________
if you look close to screenshot below that email address of the user also disclose
Zendmail rce
________________________________
from the above screenshot, ur are using zendmail for email verification
and searching through exploit of zendmail ,i found that Zendmail is vulnerable to Remote code Execution
a security researcher Dawid Golunski discover its flaw CVE-2016-10034 in December
where user can set corrupted email like '"attacker\" -oQ/tmp/ -X/var/www/cache/phpcode.php "@email.com'; cause RCE
His link https://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Remote-Code-Exec-CVE-2016-10034-Vuln.html
its possible to add such email in user account
i also reported this flaw of email REGEX https://hackerone.com/reports/226334 but you ignored
i also tried this payload but cant confirm that file has been created or not because i was testing in your website
you can also confirm by locally
Using the above username ( as") break the sql query during email sending cause exception throw
also checked that if i used that username in password reset ,server response time is delayed
it may cause Dos attack but it not possible in that case because u using Cloudflare network to prevent
Related CVEs
Associated Common Vulnerabilities and Exposures
CVE-2016-10034
UNKNOWN
The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted …
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Information Exposure Through Directory Listing