Vulnerabilities > CVE-2008-1547 - Open Redirect vulnerability in Microsoft Exchange Server 2003
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
Open redirect vulnerability in exchweb/bin/redir.asp in Microsoft Outlook Web Access (OWA) for Exchange Server 2003 SP2 (aka build 6.5.7638) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the URL parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Fake the Source of Data An adversary provides data under a falsified identity. The purpose of using the falsified identity may be to prevent traceability of the provided data or it might be an attempt by the adversary to assume the rights granted to another identity. One of the simplest forms of this attack would be the creation of an email message with a modified "From" field in order to appear that the message was sent from someone other than the actual sender. Results of the attack vary depending on the details of the attack, but common results include privilege escalation, obfuscation of other attacks, and data corruption/manipulation.
Exploit-Db
description | Microsoft Outlook Web Access for Exchange Server 2003 'redir.asp' URI Redirection Vulnerability. CVE-2008-1547. Remote exploit for windows platform |
id | EDB-ID:32489 |
last seen | 2016-02-03 |
modified | 2008-10-15 |
published | 2008-10-15 |
reporter | Martin Suess |
source | https://www.exploit-db.com/download/32489/ |
title | Microsoft Outlook Web Access for Exchange Server 2003 - 'redir.asp' URI Redirection Vulnerability |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 31765 CVE(CAN) ID: CVE-2008-1547 Microsoft Exchange Server是一款流行的邮件服务器,Outlook Web Access是Exchange中用于通过Web浏览器读取和发送邮件的工具。 Outlook Web Access的exchweb/bin/redir.asp页面存在重新定向漏洞,远程攻击者可以在邮件中发送特制的URL,如果用户已经登录的话,则点击该链接就会被立即重新定向到钓鱼网站;如果用户未登录,则点击后会显示登录页面,然后在成功认证后将用户重新定向到钓鱼网站。 Microsoft Outlook Web Access for Exchange 2003 Microsoft --------- 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本: <a href=http://www.microsoft.com/technet/security/ target=_blank>http://www.microsoft.com/technet/security/</a> |
id | SSV:4445 |
last seen | 2017-11-19 |
modified | 2008-11-14 |
published | 2008-11-14 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-4445 |
title | Microsoft Outlook Web Access redir.asp URI重新定向漏洞 |
References
- http://securityreason.com/securityalert/4441
- http://www.securityfocus.com/archive/1/497374/100/0/threaded
- http://www.securityfocus.com/archive/1/497390/100/0/threaded
- http://www.securityfocus.com/archive/1/497433/100/0/threaded
- http://www.securityfocus.com/archive/1/497500/100/0/threaded
- http://www.securityfocus.com/archive/1/497534/100/0/threaded
- http://www.securityfocus.com/bid/31765
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46061