VisNetic MailServer < 8.5.0.5 lang_settings Parameter Remote File Inclusion

medium Nessus Network Monitor Plugin ID 3690

Synopsis

The remote host is vulnerable to a Script Injection attack.

Description

The remote host is running VisNetic MailServer, a commercial mail server for the Microsoft platform. The version of VisNetic MailServer installed on the remote host fails to sanitize user-supplied input to the 'lang_settings' parameter of the 'accounts/inc/include.php' and 'admin/inc/include.php' scripts before using it to include PHP code. An unauthenticated attacker may be able to exploit these flaws to view arbitrary files on the remote host or to execute arbitrary PHP code after injecting it into the mail server's log file.

Solution

Upgrade to version 8.5.0.5 or later.

See Also

http://secunia.com/secunia_research/2006-14/advisory

http://secunia.com/secunia_research/2006-12/advisory

Plugin Details

Severity: Medium

ID: 3690

Family: SMTP Servers

Published: 7/25/2006

Updated: 3/6/2019

Nessus ID: 22079

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:deerfield:visnetic_mail_server

Reference Information

CVE: CVE-2006-0817, CVE-2006-0818

BID: 19007, 19002