Ipswitch IMail Web Interface URI Referer Session Token Disclosure

medium Nessus Plugin ID 11271

Synopsis

The remote mail server is affected by an information disclosure vulnerability.

Description

The remote host is running IMail web interface. In this version, the session is maintained via the URL. It will be disclosed in the Referer field if you receive an email with external links (e.g. images)

Solution

Upgrade to IMail 7.06 or turn off the 'ignore source address in security check' option.

See Also

https://seclists.org/bugtraq/2001/Oct/82

https://seclists.org/bugtraq/2002/Mar/164

https://seclists.org/bugtraq/2002/Mar/165

https://seclists.org/bugtraq/2002/Mar/206

https://seclists.org/bugtraq/2002/Mar/221

Plugin Details

Severity: Medium

ID: 11271

File Name: ipswitch_IMail_version.nasl

Version: 1.21

Type: remote

Family: CGI abuses

Published: 2/25/2003

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:ipswitch:imail

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 10/11/2001

Reference Information

CVE: CVE-2001-1286

BID: 3432