Macallan Mail Solution Web Interface Authentication Bypass

medium Nessus Plugin ID 16153

Synopsis

A web application on the remote host has an authentication bypass vulnerability.

Description

The remote host is running Macallan Mail Solution, a mail server (POP,SMTP,HTTP) for Windows.

It is possible to bypass web authentication by using two slashes before the requested resource. According to the vendor, this cannot be used to perform administrative actions.

Solution

Upgrade to version 4.1.1.0 or later.

See Also

http://www.nessus.org/u?b3babc9f

Plugin Details

Severity: Medium

ID: 16153

File Name: macallan_overflow.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 1/13/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 12/31/2004

Reference Information

BID: 12136

Secunia: 13710