ArGoSoft Mail Server Multiple Traversals

medium Nessus Plugin ID 16364

Synopsis

The remote web server is affected by a directory traversal vulnerability.

Description

The remote host is running the ArGoSoft WebMail interface. There are multiple flaws in this interface that may allow an authenticated attacker to read arbitrary files on the remote server and create / delete arbitrary directories on the affected host.

Solution

Upgrade to ArGoSoft 1.8.7.4 or later.

See Also

https://www.securityfocus.com/archive/1/389866

Plugin Details

Severity: Medium

ID: 16364

File Name: argosoft_dir_traversal.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 2/10/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2/9/2005

Reference Information

CVE: CVE-2005-0367

BID: 12502