|
Vulnerability Basilix Webmail System Affected Basilix Webmail System 0.9.7beta Description Tamer Sahin found following. There is a simple mistake in the Basilix Webmail system. If .class file extension is not defined as a PHP script at the httpd.conf any attacker may see very valuable information by simply enterering the URL: http://victim.host/mysql.class MySQL password and username is stored in this file. Example Exploit: http://<running-basilix>/class/mysql.class http://<running-basilix>/inc/sendmail.inc (settings.inc and etc.) Solution This is NOT realy a bug, but a misconfiguration that afect **EVERY** web server that suports a script language (like PHP, ASP, Cold Fusion or others). For example, You have Apache with PHP and configure ONLY the .php extension to be interpreted by the PHP engine; if you use one file with .php4 extension (or .inc, .class or another) as "include file", this is a potencial problem if you have typed valuable information in these files, as database connection, services running or installed, network topology and others. The problem for explore this misconfiguration is know the name of the files used as "include files" as they donīt appear in the interpreted script that calls the "include file". Workarounds for the web admin: list every file extensions used as "script files" and "include files" in the web server and verify if they are configured. These files can't be acessed by other network service (as ftp or nfs) or local. And don't forget the permission of the files... Workaround for the script writers: if your script uses uncommon extensions, include that information in the documentation, with the configuration method for the web server.