Latest YouTube Video

Monday, July 24, 2017

[FD] [RT-SA-2017-004] Unauthenticated Arbitrary File Disclosure in REDDOXX Appliance

Advisory: Unauthenticated Arbitrary File Disclosure in REDDOXX Appliance RedTeam Pentesting discovered an arbitrary file disclosure vulnerability in the REDDOXX appliance software, which allows unauthenticated attackers to download arbitrary files from the affected system. Details ======= Product: REDDOXX Appliance Affected Versions: Build 2032 / v2.0.625, older versions likely affected too Fixed Versions: Version 2032 SP2 Vulnerability Type: Arbitrary File Disclosure Security Risk: high Vendor URL: http://ift.tt/2eHLoXd Vendor Status: patch available Advisory URL: http://ift.tt/2gWSI1S Advisory Status: published CVE: GENERIC-MAP-NOMATCH CVE URL: http://ift.tt/1jQGmEN Introduction ============ "REDDOXX is a leading supplier of solutions for e-mail archiving, encrypted and digitally signed e-mail traffic as well as spam protection. Our focus is on technological innovation: taking our cue from our clients’ requirements our competent and quality-conscious employees strive to offer you the best possible products at all times. Using stringent quality standards and proven processes we keep developing our company and products continuously, with the goal of continuous improvement." (from the vendor's homepage) More Details ============ The REDDOXX appliance [0] contains a PHP script called download.php. It is available at http://ift.tt/1QkdyO9 in normal installations and resides at /opt/reddoxx/local/htdocs/download.php in the local filesystem of the appliance. Through the ISO provided on the vendor's homepage [1], it was possible to analyze this file and any other file in a typical REDDOXX appliance installation. The file contains the following source code (shortened to relevant sections):

Source: Gmail -> IFTTT-> Blogger

No comments: