MailMarshal Spam Quarantine Management (SQM) Multiple Component XSS

low Nessus Plugin ID 34336

Synopsis

The remote host has an application that is affected by a cross-site scripting vulnerability.

Description

The remote host is running MailMarshal SMTP, a mail server for Windows.

The Spam Quarantine Management web component included with the version of MailMarshal SMTP installed on the remote host is affected by a persistent cross-site scripting vulnerability in its 'delegated spam management' feature. By exploiting this issue, it may be possible for an internal user to install a malicious program on another internal user's (victim) computer, steal session cookies, or launch similar attacks.

Successful exploitation would require a victim to accept an email invitation for delegated spam management from an attacker.

Solution

Upgrade to MailMarshal SMTP 6.4 or later.

See Also

http://www.marshal.com/kb/article.aspx?id=12175

Plugin Details

Severity: Low

ID: 34336

File Name: mailmarshal_spam_quarantine_xss.nasl

Version: 1.11

Type: remote

Published: 10/3/2008

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Low

Base Score: 3.5

Temporal Score: 3

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Reference Information

CVE: CVE-2008-2831

BID: 31483

CWE: 79

Secunia: 32062