Praetorian503 Posted February 21, 2013 Report Posted February 21, 2013 The Alt-N MDaemon version 13.0.3 WorldClient application suffers from a credential disclosure vulnerability. This is possible because the application replies to a request with a response that contains the credentials in an encoded (reversible) format.========================================================================================== Alt-N MDaemon's WorldClient Disclosure of AuthenticationCredentials Vulnerability==========================================================================================Software: Alt-N MDaemon v13.0.3 and prior versionsVendor: http://www.altn.com/Vuln Type: Disclosure of Authentication CredentialsRemote: YesLocal: NoDiscovered by: QSecure and Demetris PapapetrouReferences: http://www.qsecure.com.cy/advisories/Alt-N_MDaemon_WorldClient_Disclosure_of_Authentication_Credentials.htmlDiscovered: 01/10/2012Reported: 19/12/2012Fixed: 15/01/2013 (http://files.altn.com/MDaemon/Release/RelNotes_en.html)Disclosed: 18/02/2013VULNERABILITY DESCRIPTION:==========================Alt-N WorldClient application is prone to an authenticationcredentials disclosure via a specially formulated HTTP request. Thisis possible because the application replies to the request with aresponse that contains the credentials in an encoded (reversible)format.Attackers may trick an unsuspecting user into opening a maliciousemail message -using the WorldClient application- and stealing his/herauthentication credentials without the user ever noticing.Alt-N MDaemon v13.0.3 & v12.5.6 were tested and found vulnerable;other versions may also be affected.PoC Exploit:============Vulnerable URL:http://www.example.com:3000/WorldClient.dll?Session=[SESSION_ID]&View=WebAdminEncoded Auth String:GaDAQBQOP3cymUmJxiNVaz80JTAklc/c+q7fAhmklkQSdp0XMo2X/4aVhqMtLz4OLuCf6v2T0Gc9KKHkvnok0B9ARyso9/kDecoded Auth String:User=test%40ac1dc0de.com&Password=111111Ab&TimeStamp=1344532850&Lang=enSource: PacketStorm Quote