Atmail Webmail 3.x < 3.6.4 (3.64) Multiple Vulnerabilities

medium Nessus Plugin ID 73615

Synopsis

The remote web server contains an application that is affected by multiple vulnerabilities.

Description

According to its version, the Atmail Webmail install on the remote host is 3.x prior to 3.6.4 (3.64). It is, therefore, potentially affected by the following vulnerabilities :

- An input validation error exists related to the script 'showmail.pl' and the 'Folder' parameter that could allow unauthorized access to user mailboxes, or possibly SQL injection attacks and cross-site scripting attacks.

- Input validation errors exist in the scripts 'atmail.pl', 'search.pl', and 'reademail.pl' that could allow SQL injection attacks.

- An error exists related to the handling of session cookies that could allow authorized access to user mailboxes.

Solution

Upgrade to Atmail Webmail 3.6.4 (3.64) or later.

See Also

http://www.s-quadra.com/advisories/Adv-20031209.txt

Plugin Details

Severity: Medium

ID: 73615

File Name: atmail_webmail_3_64.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 4/18/2014

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:atmail:atmail

Required KB Items: www/atmail_webmail

Excluded KB Items: Settings/disable_cgi_scanning

Patch Publication Date: 12/9/2003

Vulnerability Publication Date: 12/9/2003

Reference Information

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990