IMP Content-Type Header XSS

medium Nessus Plugin ID 12263

Language:

Synopsis

The remote web server is hosting a PHP application that is affected by a cross-site scripting vulnerability.

Description

The remote server is running at least one instance of IMP whose version number is between 2.0 and 3.2.3 inclusive. Such versions are vulnerable to a cross-scripting attack whereby an attacker may be able to cause a victim to unknowingly run arbitrary JavaScript code simply by reading a MIME message with a specially crafted Content-Type header.

Note : Nessus has determined the vulnerability exists on the target simply by looking at the version number of IMP installed there; it has not attempted to actually exploit the vulnerability.

Solution

Upgrade to IMP version 3.2.4 or later.

See Also

http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-2.txt

http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt

Plugin Details

Severity: Medium

ID: 12263

File Name: imp_content_type_xss.nasl

Version: 1.28

Type: remote

Published: 6/8/2004

Updated: 6/4/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:horde:imp

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Reference Information

CVE: CVE-2004-0584

BID: 10501

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990

GLSA: GLSA-200406-11