[SECURITY-L] ASP Application Security: CDONTS.NEWMAIL

Daniela Regina Barbetti daniela em ccuec.unicamp.br
Seg Jan 14 09:57:15 -02 2002


----- Forwarded message from aleph1 em securityfocus.com -----

From: aleph1 em securityfocus.com
Subject: (forw) ASP Application Security: CDONTS.NEWMAIL
To: secpapers em securityfocus.com
Date: Sat, 12 Jan 2002 10:19:40 -0700

----- Forwarded message from David Litchfield <david em nextgenss.com> -----

From: "David Litchfield" <david em nextgenss.com>
To: <bugtraq em securityfocus.com>
Subject: ASP Application Security: CDONTS.NEWMAIL
Date: Fri, 11 Jan 2002 15:21:35 -0000
Message-ID: <01a301c19ab3$bcb92bc0$1b01010a em XU5UDGJMHXJ300>
X-Mailer: Microsoft Outlook Express 5.50.4522.1200

Howdy,
I've written a paper on a potential risk with using the CDONTS.NEWMAIL
object in Microsoft ASP applications running on Internet Information Server.
The paper discusses how an attacker can leverage an ASP page using the
CDONTS.NEWMAIL object to send arbitrary e-mails from the vulnerable web
server. The CDONTS.NEWMAIL object is used freqently to provide e-mail
functionality for pages such as feedback or contact forms and so ASP
developers should ensure that all client input be made safe before passing
it to any of the properties of the object. Paper available from
http://www.nextgenss.com/research.html .
Cheers,
David Litchfield

----- End forwarded message -----

-- 
Elias Levy
SecurityFocus
http://www.securityfocus.com/
Si vis pacem, para bellum

----- End forwarded message -----




Mais detalhes sobre a lista de discussão SECURITY-L