Dovecot Multiple Command Traversal Arbitrary Directory Listing

medium Nessus Plugin ID 21559

Synopsis

The remote IMAP server is affected by a directory traversal vulnerability.

Description

The remote host is running Dovecot, an open source IMAP4 / POP3 server for Linux / Unix.

The version of Dovecot installed on the remote host fails to filter directory traversal sequences from user-supplied input to IMAP commands such as LIST and DELETE. An authenticated attacker may be able to leverage this issue to list directories and files in the mbox root's parent directory or possibly to delete index files used by the application.

Solution

Upgrade to Dovecot version 1.0 beta8 or later.

See Also

https://www.securityfocus.com/archive/1/archive/1/433878/100/0/threaded

https://www.dovecot.org/list/dovecot/2006-May/013385.html

Plugin Details

Severity: Medium

ID: 21559

File Name: dovecot_dir_traversal.nasl

Version: 1.21

Type: remote

Family: Misc.

Published: 5/15/2006

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:dovecot:dovecot

Required KB Items: imap/login, imap/password

Excluded KB Items: imap/false_imap

Exploit Ease: No exploit is required

Vulnerability Publication Date: 5/12/2006

Reference Information

CVE: CVE-2006-2414

BID: 17961