Penetration Testing mailing list archives
Bug found in list.org's Mailman software.
From: "bluefur0r bluefur0r" <bluefur0r () drea ms>
Date: 14 Jul 2001 21:03:45 -0000
Hello all,
when i was pen-testing a client who was running mailman v1.1. When mucking with the urls I found if you passed nothing
to the url: www.victim.org/mailman/edithtml it spills the following information:
Bug in Mailman version 1.1
We're sorry, we hit a bug!
If you would like to help us identify the problem, please email a copy of this page to the webmaster for this site with
a description of what happened. Thanks!
Traceback:
Traceback (innermost last):
File "/home/mailman/install/scripts/driver", line 112, in run_main
main()
File "/home/mailman/install/Mailman/Cgi/edithtml.py", line 49, in main
path = os.environ['PATH_INFO']
File "/usr/local/lib/python1.5/UserDict.py", line 12, in __getitem__
def __getitem__(self, key): return self.data[key]
KeyError: PATH_INFO
--------------------------------------------------------------------------------
Environment variables:
Variable Value
DOCUMENT_ROOT /home/www/XXXXXXXXXXXXX
SERVER_ADDR XXX.XXX.XXX.XXX
HTTP_ACCEPT_ENCODING gzip, deflate
SERVER_PORT 80
REMOTE_ADDR XX.XX.XX.XX
HTTP_ACCEPT_LANGUAGE en-us
GATEWAY_INTERFACE CGI/1.1
SERVER_NAME insecure.mailmanserver.org
HTTP_CONNECTION Keep-Alive
HTTP_USER_AGENT Mozilla/4.0
HTTP_ACCEPT image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*
REQUEST_URI /mailman/edithtml
PATH /sbin:/usr/sbin:/bin:/usr/bin
QUERY_STRING
SCRIPT_FILENAME /home/mailman/mailman/cgi-bin/edithtml
HTTP_HOST insecure.mailmanserver.org
REQUEST_METHOD GET
SERVER_SIGNATURE Apache/1.3.9 Server at insecure.mailmanserver.org Port 80
SCRIPT_NAME /mailman/edithtml
SERVER_ADMIN xxx () xxx com
SERVER_SOFTWARE Apache/1.3.9 (Unix)
PYTHONPATH /home/mailman/install
SERVER_PROTOCOL HTTP/1.1
REMOTE_PORT 61464
Obviously this gives an attacker a good amount of information. From testing other hosts about the internet i've come to
the following conclusions...
All are insecure up to version 2.0. the 2.0betaX's are insecure but 2.0 itself is not.
if you have any further questions please let me know at the following address:
idawson () athenasecurity com.
I've notified the people who run list.org but since it is patched after v2.0 i imagine they already know. But i did not
see anything on my exploit searches that would point to this ever being discovered/discussed. Thanks,
isaac.
From my testings:
2.0beta6 vuln 2.0beta2 vuln 1.1 vuln -=================================- 2.0.1 not vuln version 2.0.5 (101270) not vuln 2.0.5 not vuln version 2.0rc1 not vuln 2.0.3 not vuln 2.0 not vuln ================================================================= Kies een origineel e-mailadres op www.emails.nl ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- Bug found in list.org's Mailman software. bluefur0r bluefur0r (Jul 16)
