MailEnable Web Mail Client Multiple Vulnerabilities (XSS, CSRF)

medium Nessus Plugin ID 24345

Synopsis

The remote webmail service is affected by multiple issues.

Description

The Web Mail Client bundled with the version of MailEnable installed on the remote host reportedly fails to properly sanitize email messages and various script parameters of malicious script code, which can lead to cross-site scripting, cross-site request forgery, and script insertion attacks against the affected software.

Solution

Upgrade to MailEnable Professional Edition 1.85 / 2.37 or Enterprise 1.42 / 2.37 or later as they are rumoured to address the issues.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2007-38/advisory/

http://www.mailenable.com/Professional20-ReleaseNotes.txt

http://www.mailenable.com/Enterprise20-ReleaseNotes.txt

Plugin Details

Severity: Medium

ID: 24345

File Name: mailenable_webmail_xss.nasl

Version: 1.18

Type: local

Family: CGI abuses

Published: 2/15/2007

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.3

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Required KB Items: SMB/MailEnable/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2/14/2007

Reference Information

CVE: CVE-2007-0651, CVE-2007-0652

BID: 22554

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990