Praetorian503 Posted February 21, 2013 Report Posted February 21, 2013 The Alt-N MDaemon version 13.0.3 WorldClient application suffers from a predictable session identifier vulnerability.====================================================================== Alt-N MDaemon's WorldClient Predictable Session ID Vulnerability======================================================================Software: Alt-N MDaemon v13.0.3 and prior versionsVendor: http://www.altn.com/Vuln Type: Session ID PredictionRemote: YesLocal: NoDiscovered by: QSecure and Demetris PapapetrouReferences: http://www.qsecure.com.cy/advisories/Alt-N_MDaemon_WorldClient_Predictable_Session_ID.htmlDiscovered: 25/07/2012Reported: 19/12/2012Fixed: 15/01/2013 (http://files.altn.com/MDaemon/Release/RelNotes_en.html)Disclosed: 18/02/2013VULNERABILITY DESCRIPTION:==========================Alt-N WorldClient is the web interface of the MDaemon email server. Ithas been identified that application session state is not maintainedby the user's session cookie but by the URL "Session" parameterinstead. This parameter is transmitted with every user request sent tothe WorldClient web application and under certain circumstances futuresession IDs can be successfully predicted.The use of predictable session IDs for authentication makesWorldClient prone to session hijacking attacks. If the attacker cangenerate a current valid session ID then he/she may be able to accesswebmail accounts without possessing a valid username/password. Theimpact of the attack is significantly reduced because WorldClientassociates the client's IP address with each session ID produced.However, certain network setups or other scenarios may exist thatcould render the IP restriction ineffective.Alt-N MDaemon v13.0.3 & v12.5.6 were tested and found vulnerable;other versions may also be affected.Pre-Requisites:---------------1) The attacker needs to get a current or expired session ID. a) Google Search: "WorldClient.dll?Session=" Steal an HTTP request and observe the Referer field2) The MDaemon service or the machine has not been restarted since thecaptured session ID was generated (There may be a way to deal withthis but further research is needed).Source: PacketStorm Quote