ID OSVDB:19828 Type osvdb Reporter ShineShadow(ss_contacts@hotmail.com) Modified 2005-09-29T17:16:06
Description
Vulnerability Description
IceWarp Web Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'createdataCX' variable upon submission to the 'calendar_w.html' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Solution Description
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Short Description
IceWarp Web Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'createdataCX' variable upon submission to the 'calendar_w.html' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
{"enchantments": {"score": {"value": 5.2, "vector": "NONE", "modified": "2017-04-28T13:20:16", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2005-3131"]}, {"type": "exploitdb", "idList": ["EDB-ID:26310", "EDB-ID:26311", "EDB-ID:26309"]}, {"type": "osvdb", "idList": ["OSVDB:19827", "OSVDB:19825", "OSVDB:19826"]}, {"type": "nessus", "idList": ["ICEWARP_WEBMAIL_VULNS4.NASL"]}], "modified": "2017-04-28T13:20:16", "rev": 2}, "vulnersScore": 5.2}, "bulletinFamily": "software", "affectedSoftware": [{"name": "IceWarp Web Mail", "operator": "eq", "version": "5.5.1"}, {"name": "Merak Mail Server", "operator": "eq", "version": "8.4.2r"}], "references": [], "href": "https://vulners.com/osvdb/OSVDB:19828", "id": "OSVDB:19828", "title": "IceWarp WebMail calendar_w.html createdataCX Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "lastseen": "2017-04-28T13:20:16", "edition": 1, "reporter": "ShineShadow(ss_contacts@hotmail.com)", "description": "## Vulnerability Description\nIceWarp Web Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'createdataCX' variable upon submission to the 'calendar_w.html' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nIceWarp Web Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'createdataCX' variable upon submission to the 'calendar_w.html' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[target]:32000/mail/calendar_w.html?schedule=1&print=1&createdataCX=[xss_here]\n## References:\nVendor URL: http://www.icewarp.com/\n[Secunia Advisory ID:17046](https://secuniaresearch.flexerasoftware.com/advisories/17046/)\n[Related OSVDB ID: 19827](https://vulners.com/osvdb/OSVDB:19827)\n[Related OSVDB ID: 19829](https://vulners.com/osvdb/OSVDB:19829)\n[Related OSVDB ID: 19831](https://vulners.com/osvdb/OSVDB:19831)\n[Related OSVDB ID: 19825](https://vulners.com/osvdb/OSVDB:19825)\n[Related OSVDB ID: 19830](https://vulners.com/osvdb/OSVDB:19830)\n[Related OSVDB ID: 19826](https://vulners.com/osvdb/OSVDB:19826)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-09/0345.html\n[CVE-2005-3131](https://vulners.com/cve/CVE-2005-3131)\nBugtraq ID: 14980\n", "modified": "2005-09-29T17:16:06", "viewCount": 1, "published": "2005-09-29T17:16:06", "cvelist": ["CVE-2005-3131"]}
{"cve": [{"lastseen": "2020-10-03T11:34:56", "description": "Multiple cross-site scripting (XSS) vulnerabilities in MERAK Mail Server 8.2.4r with Icewarp Web Mail 5.5.1, and possibly earlier versions, allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to blank.html, or the createdataCX parameter to (2) calendar_d.html, (3) calendar_m.html, or (4) calendar_w.html.", "edition": 3, "cvss3": {}, "published": "2005-10-04T22:02:00", "title": "CVE-2005-3131", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-3131"], "modified": "2016-10-18T03:32:00", "cpe": ["cpe:/a:icewarp:web_mail:5.5.1", "cpe:/a:merak:mail_server:8.2.4r"], "id": "CVE-2005-3131", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3131", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:icewarp:web_mail:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:merak:mail_server:8.2.4r:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:16", "bulletinFamily": "software", "cvelist": ["CVE-2005-3131"], "edition": 1, "description": "## Vulnerability Description\nIceWarp Web Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'id' variable upon submission to the 'blank.html' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nIceWarp Web Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'id' variable upon submission to the 'blank.html' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[target]:32000/mail/blank.html?id=[xss_here]\n## References:\nVendor URL: http://www.icewarp.com/\n[Secunia Advisory ID:17046](https://secuniaresearch.flexerasoftware.com/advisories/17046/)\n[Related OSVDB ID: 19827](https://vulners.com/osvdb/OSVDB:19827)\n[Related OSVDB ID: 19829](https://vulners.com/osvdb/OSVDB:19829)\n[Related OSVDB ID: 19831](https://vulners.com/osvdb/OSVDB:19831)\n[Related OSVDB ID: 19830](https://vulners.com/osvdb/OSVDB:19830)\n[Related OSVDB ID: 19828](https://vulners.com/osvdb/OSVDB:19828)\n[Related OSVDB ID: 19826](https://vulners.com/osvdb/OSVDB:19826)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-09/0345.html\n[CVE-2005-3131](https://vulners.com/cve/CVE-2005-3131)\nBugtraq ID: 14980\n", "modified": "2005-09-29T17:16:06", "published": "2005-09-29T17:16:06", "href": "https://vulners.com/osvdb/OSVDB:19825", "id": "OSVDB:19825", "title": "IceWarp WebMail blank.html id Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:16", "bulletinFamily": "software", "cvelist": ["CVE-2005-3131"], "edition": 1, "description": "## Vulnerability Description\nIceWarp Web Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'createdataCX' variable upon submission to the 'calendar_d.html' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nIceWarp Web Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'createdataCX' variable upon submission to the 'calendar_d.html' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[target]:32000/mail/calendar_d.html?schedule=1&print=1&createdataCX=[xss_here]\n## References:\nVendor URL: http://www.icewarp.com/\n[Secunia Advisory ID:17046](https://secuniaresearch.flexerasoftware.com/advisories/17046/)\n[Related OSVDB ID: 19827](https://vulners.com/osvdb/OSVDB:19827)\n[Related OSVDB ID: 19829](https://vulners.com/osvdb/OSVDB:19829)\n[Related OSVDB ID: 19831](https://vulners.com/osvdb/OSVDB:19831)\n[Related OSVDB ID: 19825](https://vulners.com/osvdb/OSVDB:19825)\n[Related OSVDB ID: 19830](https://vulners.com/osvdb/OSVDB:19830)\n[Related OSVDB ID: 19828](https://vulners.com/osvdb/OSVDB:19828)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-09/0345.html\n[CVE-2005-3131](https://vulners.com/cve/CVE-2005-3131)\nBugtraq ID: 14980\n", "modified": "2005-09-29T17:16:06", "published": "2005-09-29T17:16:06", "href": "https://vulners.com/osvdb/OSVDB:19826", "id": "OSVDB:19826", "title": "IceWarp WebMail calendar_d.html createdataCX Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:16", "bulletinFamily": "software", "cvelist": ["CVE-2005-3131"], "edition": 1, "description": "## Vulnerability Description\nIceWarp Web Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'createdataCX' variable upon submission to the 'calendar_m.html' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nIceWarp Web Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'createdataCX' variable upon submission to the 'calendar_m.html' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[target]:32000/mail/calendar_m.html?schedule=1&print=1&createdataCX=[xss_here]\n## References:\nVendor URL: http://www.icewarp.com/\n[Secunia Advisory ID:17046](https://secuniaresearch.flexerasoftware.com/advisories/17046/)\n[Related OSVDB ID: 19829](https://vulners.com/osvdb/OSVDB:19829)\n[Related OSVDB ID: 19831](https://vulners.com/osvdb/OSVDB:19831)\n[Related OSVDB ID: 19825](https://vulners.com/osvdb/OSVDB:19825)\n[Related OSVDB ID: 19830](https://vulners.com/osvdb/OSVDB:19830)\n[Related OSVDB ID: 19828](https://vulners.com/osvdb/OSVDB:19828)\n[Related OSVDB ID: 19826](https://vulners.com/osvdb/OSVDB:19826)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-09/0345.html\n[CVE-2005-3131](https://vulners.com/cve/CVE-2005-3131)\nBugtraq ID: 14980\n", "modified": "2005-09-29T17:16:06", "published": "2005-09-29T17:16:06", "href": "https://vulners.com/osvdb/OSVDB:19827", "id": "OSVDB:19827", "title": "IceWarp WebMail calendar_m.html createdataCX Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "exploitdb": [{"lastseen": "2016-02-03T03:19:17", "description": "IceWarp Web Mail 5.5.1 calendar_d.html createdataCX Parameter XSS. CVE-2005-3131. Webapps exploit for php platform", "published": "2005-09-30T00:00:00", "type": "exploitdb", "title": "IceWarp Web Mail 5.5.1 calendar_d.html createdataCX Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-3131"], "modified": "2005-09-30T00:00:00", "id": "EDB-ID:26309", "href": "https://www.exploit-db.com/exploits/26309/", "sourceData": "source: http://www.securityfocus.com/bid/14980/info\r\n \r\nIceWarp is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.\r\n \r\nAn attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. These may facilitate the theft of cookie-based authentication credentials as well as other attacks. \r\n\r\nhttp://www.example.com:32000/mail/calendar_d.html?schedule=1&print=1&createdataCX=[xss_here]", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/26309/"}, {"lastseen": "2016-02-03T03:19:26", "description": "IceWarp Web Mail 5.5.1 calendar_m.html createdataCX Parameter XSS. CVE-2005-3131. Webapps exploit for php platform", "published": "2005-09-30T00:00:00", "type": "exploitdb", "title": "IceWarp Web Mail 5.5.1 calendar_m.html createdataCX Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-3131"], "modified": "2005-09-30T00:00:00", "id": "EDB-ID:26310", "href": "https://www.exploit-db.com/exploits/26310/", "sourceData": "source: http://www.securityfocus.com/bid/14980/info\r\n \r\nIceWarp is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.\r\n \r\nAn attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. These may facilitate the theft of cookie-based authentication credentials as well as other attacks. \r\n\r\nhttp://www.example.com:32000/mail/calendar_m.html?schedule=1&print=1&createdataCX=[xss_here]", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/26310/"}, {"lastseen": "2016-02-03T03:19:34", "description": "IceWarp Web Mail 5.5.1 calendar_w.html createdataCX Parameter XSS. CVE-2005-3131. Webapps exploit for php platform", "published": "2005-09-30T00:00:00", "type": "exploitdb", "title": "IceWarp Web Mail 5.5.1 calendar_w.html createdataCX Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-3131"], "modified": "2005-09-30T00:00:00", "id": "EDB-ID:26311", "href": "https://www.exploit-db.com/exploits/26311/", "sourceData": "source: http://www.securityfocus.com/bid/14980/info\r\n \r\nIceWarp is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.\r\n \r\nAn attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. These may facilitate the theft of cookie-based authentication credentials as well as other attacks. \r\n\r\nhttp://www.example.com:32000/mail/calendar_w.html?schedule=1&print=1&createdataCX=[xss_here] ", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/26311/"}], "nessus": [{"lastseen": "2021-01-01T03:16:22", "description": "The remote host is running IceWarp Web Mail - a webmail solution\navailable for the Microsoft Windows platform. \n\nThe remote version of this software is affected by a directory\ntraversal vulnerability that may allow an attacker to retrieve\narbitrary files on the system. \n\nAnother input validation flaw allows an attacker to delete arbitrary\nfiles on the remote host. \n\nNote this flaw indicates IceWarp is vulnerable to cross-site scripting\nattacks too.", "edition": 24, "published": "2005-09-30T00:00:00", "title": "IceWarp Web Mail Multiple Flaws (4)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3132", "CVE-2005-3133", "CVE-2005-3131"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:icewarp:webmail"], "id": "ICEWARP_WEBMAIL_VULNS4.NASL", "href": "https://www.tenable.com/plugins/nessus/19784", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19784);\n script_version(\"1.19\");\n script_cvs_date(\"Date: 2018/11/15 20:50:17\");\n\n script_cve_id(\"CVE-2005-3131\", \"CVE-2005-3132\", \"CVE-2005-3133\");\n script_bugtraq_id(14988, 14986, 14980);\n\n script_name(english:\"IceWarp Web Mail Multiple Flaws (4)\");\n script_summary(english:\"Check the version of IceWarp WebMail\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"It is possible to retrieve/delete local files on the remote system\nthrough the webmail service.\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running IceWarp Web Mail - a webmail solution\navailable for the Microsoft Windows platform. \n\nThe remote version of this software is affected by a directory\ntraversal vulnerability that may allow an attacker to retrieve\narbitrary files on the system. \n\nAnother input validation flaw allows an attacker to delete arbitrary\nfiles on the remote host. \n\nNote this flaw indicates IceWarp is vulnerable to cross-site scripting\nattacks too.\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://marc.info/?l=bugtraq&m=112810385104168&w=2\" );\n script_set_attribute(attribute:\"solution\", value:\n\"Unknown at this time.\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:U/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2005/09/30\");\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2005/09/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:icewarp:webmail\");\n script_set_attribute(attribute:\"exploited_by_nessus\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n script_copyright(english:\"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.\");\n\n script_dependencie(\"icewarp_webmail_vulns.nasl\");\n script_require_ports(\"Services/www\", 32000);\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\nport = get_http_port(default:32000);\n\nversion = get_kb_item(\"www/\" + port + \"/icewarp_webmail/version\");\nif ( ! version ) exit(0);\n\nu = \"/accounts/help.html?helpid=../../../../../../../../../../../../boot.ini%00\";\n\nw = http_send_recv3(method:\"GET\", item:u, port:port);\nif (isnull(w)) exit(0);\nr = w[2];\n\nr = strstr (r, \"[boot loader]\");\nif (isnull(r)) exit (0);\n\nreport = string (\"It was possible to retrieve the file boot.ini :\\n\\n\",\tr);\n\nsecurity_hole (port:port, extra: report);\nset_kb_item(name: 'www/'+port+'/XSS', value: TRUE);\n", "cvss": {"score": 9.7, "vector": "AV:N/AC:L/Au:N/C:C/I:P/A:C"}}]}