Syneto EMail Protection 1.5.1 - Code Execution Vulnerability

2012-06-23T00:00:00
ID VULNERLAB:548
Type vulnerlab
Reporter Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@vulnerability-lab.com)
Modified 2012-06-23T00:00:00

Description

                                        
                                            Document Title:
===============
Syneto EMail Protection 1.5.1 - Code Execution Vulnerability 


References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=548

Syneto ID:  2601


Release Date:
=============
2012-06-23


Vulnerability Laboratory ID (VL-ID):
====================================
548


Common Vulnerability Scoring System:
====================================
3.1


Product & Service Introduction:
===============================
Email Protection is a powerful perimeter email anti-malware product. It fights spam, viruses, zombies 
and phishing attacks, provides realtime updates and powerful reporting capabilities that help prevent 
email threats from reaching your computers, thus reducing costs and increasing productivity.
The web content filter helps ensure that employees access only those resources that help them accomplish 
work related activities. Access to time wasting social networks like Twitter and Facebook can be restricted 
or completely eliminated. Internet crime is at an all-time high. There are thousands of sites that try to 
steal credit card information or install viruses and spyware programs on your computer. Sadly, at the rate 
that they are appearing, anything less than a fully automated solution won’t catch them. By blocking malware 
websites using Web Protection, you make sure nobody will ever access them, and lower the risk for data 
and financial losses. Legislation makes it the company’s responsibility to ensure a safe environment for the 
employees. That includes restricting access to potentially illegal resources and websites. The Application 
Filter can block downloads from P2P networks (torrents, aMule etc.) or via Instant Messengers. A lot of similar 
products are built by highly technical engineers and as such, lack attention to regular users who a lot of 
times are frustrated by seemingly impossible configuration interfaces. Our development philosophy emphasizes 
ease of use, so we spend a lot of time doing usability studies that help us create easy to use, yet powerful 
products. Configuring and deploying such a product can be a real challenge in more complex environments. We 
offer professional technical support to all our customers, thus making sure they get from zero to a fully 
functioning installation in the shortest time possible. Each business is unique and so is their I.T. infrastructure. 
Our customers demand ease of integration into existing networks. Web Protection can be deployed in a variety 
of scenarios, thanks to its ability to come in several versions (hardware, software and virtualized).

(Copy of the Vendor Homepage: http://syneto.net/network-security/email-protection )


Abstract Advisory Information:
==============================
The Vulnerability Laboratory Researcher Team discovered multiple web vulnerabilities in Syneto Total EMail Protection Appliance v1.5.1 PE.


Vulnerability Disclosure Timeline:
==================================
2012-05-04:	Researcher Notification & Coordination
2012-05-06:	Vendor Notification
2012-05-28:	Vendor Response/Feedback
2012-00-00:	Vendor Fix/Patch
2012-00-00:	Public or Non-Public Disclosure


Discovery Status:
=================
Published


Affected Product(s):
====================
Syneto
Product: Total EMail Protection 1.5.1 Professional Edition


Exploitation Technique:
=======================
Remote


Severity Level:
===============
Low


Technical Details & Description:
================================
A code execution vulnerability with persistent (db stored) effect is detected in Syneto Total EMail Protection Appliance v1.5.1 PE.
The vulnerability is located on the remote backup module & stored version display in the syneto firmware update function. The bugs 
allows remote attackers or low privileged user accounts to load backup files via url as file value request with unsanitized name. 
Attackers can include as the url file name of the value request own program code like statements, exploits, malware or malicious 
script codes to compromise the system. The executed url context will be displayed as last update request on the firmware when 
successfully exploited by attackers. The vulnerability is only exploitable with high privileged email protection appliance application account.


Vulnerable Module(s):
				[+] Backup Module URL & Note

Picture(s):
				../1.png


Proof of Concept (PoC):
=======================
The persistent input validation vulnerabilities can be exploited by remote attacker with low or medium required 
user inter action. For demonstration or reproduce ...

Review: Backup Module URL & Note

<tr class="tableRowEven" id="remote_backup_109186">
<td class="backup_info_cell_sticky"><img src="backups.php3-Dateien/disabled.gif"></td>
<td class="backup_info_cell_timestamp">4 May 2012 04:55</td>
<td class="backup_info_cell_file">
<a href="https://demotep.syneto.net/functionality/configuration/syneto.php?menuid=-1&
action=download&id=109186&file=%5C%22%3E%3Ca%20href=http://vulnerability-lab.com%3E&
tab=remote_backups">\"><a href=http://useless.com></a>
</td>
<td class="backup_info_cell_notes">"><iframe src="backups.php3-Dateien/a.htm" [EXECUTES CODE HERE!]' <<="" td="">        
<td class="backup_info_cell_version 
">1.3.3-3362</td>


POC:
https://eps.127.0.0.1:80/functionality/configuration/backups.php?action=download&id=109186&file=[DB CODE EXECUTION]


Security Risk:
==============
The security risk of the code execution vulnerability is estimated as medium(-).


Credits & Authors:
==================
Vulnerability Laboratory [Research Team]  -    Benjamin Kunz Mejri (bkm@vulnerability-lab.com)


Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases 
or trade with fraud/stolen material.

Domains:    www.vulnerability-lab.com   	- www.vuln-lab.com			       - www.vulnerability-lab.com/register
Contact:    admin@vulnerability-lab.com 	- support@vulnerability-lab.com 	       - research@vulnerability-lab.com
Section:    video.vulnerability-lab.com 	- forum.vulnerability-lab.com 		       - news.vulnerability-lab.com
Social:	    twitter.com/#!/vuln_lab 		- facebook.com/VulnerabilityLab 	       - youtube.com/user/vulnerability0lab
Feeds:	    vulnerability-lab.com/rss/rss.php	- vulnerability-lab.com/rss/rss_upcoming.php   - vulnerability-lab.com/rss/rss_news.php

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other 
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and 
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), 
modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.

    				   	Copyright © 2012 | Vulnerability Laboratory