Lucene search

K
nessusThis script is Copyright (C) 2003-2022 and is owned by Tenable, Inc. or an Affiliate thereof.IPSWITCH_IMAIL_VERSION.NASL
HistoryFeb 25, 2003 - 12:00 a.m.

Ipswitch IMail Web Interface URI Referer Session Token Disclosure

2003-02-2500:00:00
This script is Copyright (C) 2003-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
25

The remote host is running IMail web interface. In this version, the session is maintained via the URL. It will be disclosed in the Referer field if you receive an email with external links (e.g. images)

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

# References:
#
# http://www.nessus.org/u?fd6d1531
#
# Date:  Sun, 10 Mar 2002 21:37:33 +0100
# From: "Obscure" <[email protected]>
# To: [email protected], [email protected]
# Subject: IMail Account hijack through the Web Interface
#
#  Date:  Mon, 11 Mar 2002 04:11:43 +0000 (GMT)
# From: "Zillion" <[email protected]>
# To: "Obscure" <[email protected]>
# CC: [email protected], [email protected], "Obscure" <[email protected]>
# Subject: Re: IMail Account hijack through the Web Interface
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(11271);
  script_version("1.21");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2001-1286");
  script_bugtraq_id(3432);

  script_name(english:"Ipswitch IMail Web Interface URI Referer Session Token Disclosure");

  script_set_attribute(attribute:"synopsis", value:
"The remote mail server is affected by an information disclosure 
vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote host is running IMail web interface. In this version, the
session is maintained via the URL. It will be disclosed in the 
Referer field if you receive an email with external links (e.g. images)");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2001/Oct/82");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/164");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/165");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/206");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/221");
  script_set_attribute(attribute:"solution", value:
"Upgrade to IMail 7.06  or turn off the 'ignore source address 
in security check' option.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2001/10/11");
  script_set_attribute(attribute:"plugin_publication_date", value:"2003/02/25");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ipswitch:imail");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2003-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("find_service1.nasl", "no404.nasl", "http_version.nasl");
  script_require_ports("Services/www", 80);

  exit(0);
}

# The script code starts here

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);

banner = get_http_banner(port: port);
if (isnull(banner)) exit(1, "Failed to get the banner from port "+port+".");

serv = egrep(string: banner, pattern: "^Server:.*");
if(serv && ereg(pattern:"^Server:.*Ipswitch-IMail/(([1-6]\.)|(7\.0[0-5]))", string:serv))
   security_warning(port);
VendorProductVersionCPE
ipswitchimailcpe:/a:ipswitch:imail
Related for IPSWITCH_IMAIL_VERSION.NASL