BizMail bizmail.cgi Arbitrary Mail Relay

medium Nessus Plugin ID 17193

Synopsis

The remote web server contains a CGI script that allows unauthorized mail relaying.

Description

The remote web server is hosting the CGI bizmail.cgi, a CGI script for sending the content of web forms to email addresses.

The remote version of this software fails to sanitize the 'email' parameter to the 'bizmail.cgi' script of CRLF sequences. An unauthenticated, remote attacker may be able to leverage this issue to send spam or other sorts of abusive mail through the affected host.

Solution

Unknown at this time.

See Also

https://seclists.org/bugtraq/2005/Feb/362

https://secuniaresearch.flexerasoftware.com/advisories/14351/

Plugin Details

Severity: Medium

ID: 17193

File Name: bizmail_cgi_xss.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 2/22/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2/18/2005

Reference Information

CVE: CVE-2005-0493

BID: 12620

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990