Horde IMP mailbox.php3 Multiple Parameter SQL Injection

high Nessus Plugin ID 11488

Language:

Synopsis

The remote web server is running a PHP application that is affected by multiple sql injection vulnerabilities.

Description

The remote server is running IMP, a web-based mail client. There is a bug in the installed version which allows an attacker to perform a SQL injection attack using the 'actionID' parameter of the 'mailbox.php3' script.

An attacker may use this flaw to gain unauthorized access to a user mailbox or to take the control of the remote database.

Solution

IMP 2.x is deprecated. Update to IMP 3.x or 4.x.

See Also

https://marc.info/?l=bugtraq&m=104204786206563&w=2

Plugin Details

Severity: High

ID: 11488

File Name: imp_sql_injection.nasl

Version: 1.23

Type: remote

Family: CGI abuses

Published: 3/27/2003

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:horde:imp

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 1/8/2003

Reference Information

CVE: CVE-2003-0025

BID: 6559