Lucene search

K
nessusThis script is Copyright (C) 2009-2022 Tenable Network Security, Inc.ATMAIL_WEBMAIL_5_61_ADMIN_XSS.NASL
HistoryApr 30, 2009 - 12:00 a.m.

Atmail WebMail <= 5.6.1 (5.61) webadmin/admin.php Multiple Parameter XSS

2009-04-3000:00:00
This script is Copyright (C) 2009-2022 Tenable Network Security, Inc.
www.tenable.com
19

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

44.1%

The version of Atmail WebMail running on the remote host is vulnerable to multiple cross-site scripting issues. ‘webadmin/admin.php’ fails to sanitize input to the ‘func’ parameter, and to the ‘type’ parameter (when ‘func’ is set to ‘stats’). This is known to affect version 5.6.1 (5.61) and may affect previous versions as well.

A remote attacker could exploit this by tricking a user into requesting a web page with arbitrary script code injected. This could lead to consequences such as stolen authentication credentials.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(38650);
  script_version("1.15");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2009-2455");
  script_bugtraq_id(34762);
  script_xref(name:"SECUNIA", value:"34403");

  script_name(english:"Atmail WebMail <= 5.6.1 (5.61) webadmin/admin.php Multiple Parameter XSS");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is running a web application with multiple cross-site
scripting vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Atmail WebMail running on the remote host is vulnerable
to multiple cross-site scripting issues. 'webadmin/admin.php' fails to
sanitize input to the 'func' parameter, and to the 'type' parameter
(when 'func' is set to 'stats'). This is known to affect version 5.6.1
(5.61) and may affect previous versions as well.

A remote attacker could exploit this by tricking a user into
requesting a web page with arbitrary script code injected. This could
lead to consequences such as stolen authentication credentials.");
  script_set_attribute(attribute:"solution", value:
"There is no known solution at this time.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(79);

  script_set_attribute(attribute:"vuln_publication_date", value:"2009/07/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/30");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:atmail:atmail");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses : XSS");

  script_copyright(english:"This script is Copyright (C) 2009-2022 Tenable Network Security, Inc.");

  script_dependencies("atmail_webmail_detect.nasl");
  script_require_keys("www/PHP");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");

port = get_http_port(default:80, php:TRUE);
install = get_install_from_kb(appname:'atmail_webmail', port:port, exit_on_fail:TRUE);

dir = install['dir'];
display_version = install['ver'];
# Get normalized version for check
kb_dir = str_replace(string:dir, find:"/", replace:"\");
version = get_kb_item_or_exit('www/'+port+'/atmail_webmail_normalized_ver/'+kb_dir+'/'+display_version);
install_url = build_url(port:port, qs:dir);

if (version == UNKNOWN_VER || isnull(version))
  audit(AUDIT_UNKNOWN_WEB_APP_VER, "Atmail Webmail", install_url);

if (ver_compare(ver:version, fix:'5.6.1', strict:FALSE) <= 0)
{
  set_kb_item(name:'www/'+port+'/XSS', value:TRUE);

  if (report_verbosity > 0)
  {
    xss = string("<script>alert('", SCRIPT_NAME, "')</script>");
    url = string(dir, "/webadmin/admin.php?func=", xss);

        report =
      '\n  URL               : ' + install_url +
      '\n  Installed version : ' + version + ' ('+display_version+')\n\n';

    report += "
Nessus was only able to detect this issue by looking at the
application's version number. Please confirm this issue exists by
attempting a non-persisent XSS attack using the following URL :

  " + build_url(port:port, qs:url) +
'\n\nNote that this URL requires authentication.\n';

    security_warning(port:port, extra:report);
  }
  else security_warning(port);
}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, "Atmail Webmail", install_url, version);
VendorProductVersionCPE
atmailatmailcpe:/a:atmail:atmail

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

44.1%

Related for ATMAIL_WEBMAIL_5_61_ADMIN_XSS.NASL