Open Hebing123 opened 10 months ago
According to the manufacturer, the Atmail 6 was "retired" on June 30, 2014. As of this date, no further security improvements, bug fixes, or customer support are provided with this version of the product.
According to the statistics of the network mapping system, the network assets of the system are still more than 10k!
Therefore, I disclosed this report in the hope that users of the system will be able to fix it in time.
This is the vulnerability exploitation reference for CVE-2024-24133.
Summary
On January 12, we discovered that atmail 6.6.0 and atmail 6.3.0 weretested for SQL injection vulnerabilities that could be larger than 6.6.0.
The username parameter during admin login is at risk of SQL injection.
Details
We can prove this with delayed SQL injection, which we have testedon versions 6.6.0 and 6.3.0 and proved to have SQL injection vulnerabilities.
Proof of Concept (POC)
As shown in the figure, a delay of 6 seconds proves that the injected SQL statement: sleep(6) has been executed.
As shown in the figure, a delay of 10 seconds proves that the injected SQL statement: sleep(10) has been executed.
Impact