iXmail Multiple Script Arbitrary File Manipulation

medium Nessus Plugin ID 11781

Language:

Synopsis

The remote webmail application is affected by a file upload vulnerability.

Description

The remote host is running the iXmail webmail interface.

There is a flaw in this interface which allows an attacker who has a valid account on this host to upload and execute arbitrary php files on this host, thus potentially gaining a shell on this host. An attacker may also use this flaw to delete arbitrary files on the remote host, with the privileges of the web server.

Solution

Upgrade to iXMail 0.4

See Also

https://www.phpsecure.info/v2/tutos/frog/iXmail.txt

Plugin Details

Severity: Medium

ID: 11781

File Name: ixmail_arbitrary_file_upload.nasl

Version: 1.19

Type: remote

Family: CGI abuses

Published: 6/27/2003

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Reference Information

BID: 8046, 8048