WorldMail IMAP Server Traversal Arbitrary Mail Spool Access

medium Nessus Plugin ID 20224

Synopsis

The remote IMAP server is affected by a directory traversal flaw.

Description

The remote host is running Eudora WorldMail, a commercial mail server for Windows.

The IMAP server bundled with the version of WorldMail installed on the remote host fails to filter directory traversal sequences from mailbox names and fails to restrict access to mailboxes within its spool area. An authenticated attacker can exploit these issues to read and manage the messages of other users on the affected application as well as to move arbitrary folders on the affected system. Such attacks could result in the disclosure of sensitive information as well as affect the stability of the remote host itself.

Solution

Unknown at this time.

See Also

http://www.nessus.org/u?d69b5a45

Plugin Details

Severity: Medium

ID: 20224

File Name: worldmail_dir_traversal.nasl

Version: 1.15

Type: remote

Agent: windows

Family: Windows

Published: 11/18/2005

Updated: 8/7/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: imap/login, imap/password

Excluded KB Items: imap/false_imap, imap/overflow

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 11/17/2005

Reference Information

CVE: CVE-2005-3189

BID: 15488