SqWebMail login error information disclosure

sqwebmail-login-info-disclosure (15058) The risk level is classified as LowLow Risk

Description:

SqWebMail could allow a remote attacker to determine valid passwords. SqWebMail displays different error messages for valid and invalid passwords. If a remote attacker determines a valid password, the attacker could use brute force methods to determine the username and gain unauthorized access to the SqWebMail account.


Consequences:

Obtain Information

Remedy:

No remedy available as of August 1, 2014.

References:

  • BugTraq Mailing List, 2004-02-03 14:40:24: Re: sqwebmail web login.
  • BugTraq Mailing List, Sat Jan 31 2004 - 03:54:12 CST : sqwebmail web login.
  • BID-9541: SqWebMail Authentication Response Information Leakage Weakness
  • CVE-2004-0243: AIX 4.3.3 through AIX 5.1, when direct remote login is disabled, displays a different message if the password is correct, which allows remote attackers to guess the password via brute force methods.
  • CVE-2004-2313: Inter7 SqWebMail 3.4.1 through 3.6.1 generates different error messages for incorrect passwords versus correct passwords on non-mail-enabled accounts (such as root), which allows remote attackers to guess the root password via brute force attacks.
  • OSVDB ID: 19833: SqWebMail Error Message Account Enumeration

Platforms Affected:

  • Inter7 SqWebMail

Reported:

Jan 31, 2004

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page