Loading HuntDB...

Directory Disclose,Email Disclose Zendmail vulnerability

P
Paragon Initiative Enterprises
Submitted None
Reported by test_this

Vulnerability Details

Technical details and impact analysis

Information Exposure Through Directory Listing
i found three vulnerability Directory information disclose,Email address disclose, and possible Remote code execution in Zendmail during signup your code accept username with ',",/,@ while all of the special character must be forbidden or encoded in username Directory Disclose: ______________________ 1. goto sign-up page and create a account with username with double quote like as" 2. signin and goto ur account and add email address, then logout 3.goto Forgot-Password section and enter username of above ( as" ) 4.and see full path of server has been disclose (screenshot: directory.png) Email address Disclose _________________________ if you look close to screenshot below that email address of the user also disclose Zendmail rce ________________________________ from the above screenshot, ur are using zendmail for email verification and searching through exploit of zendmail ,i found that Zendmail is vulnerable to Remote code Execution a security researcher Dawid Golunski discover its flaw CVE-2016-10034 in December where user can set corrupted email like '"attacker\" -oQ/tmp/ -X/var/www/cache/phpcode.php "@email.com'; cause RCE His link https://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Remote-Code-Exec-CVE-2016-10034-Vuln.html its possible to add such email in user account i also reported this flaw of email REGEX https://hackerone.com/reports/226334 but you ignored i also tried this payload but cant confirm that file has been created or not because i was testing in your website you can also confirm by locally Using the above username ( as") break the sql query during email sending cause exception throw also checked that if i used that username in password reset ,server response time is delayed it may cause Dos attack but it not possible in that case because u using Cloudflare network to prevent

Related CVEs

Associated Common Vulnerabilities and Exposures

The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted …

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Exposure Through Directory Listing