IronMail IronWebMail IM_FILE Identifier Encoded Traversal Arbitrary File Access

medium Nessus Plugin ID 22901

Synopsis

The remote web server is prone to a directory traversal attack.

Description

The remote host appears to be an IronMail appliance, which is intended to protect enterprise-class email servers from spam, viruses, and hackers.

The webmail component of the remote IronMail device does not properly validate pathname references included in a URL before using them to return the contents of files on the remote host. An unauthenticated attacker can leverage this flaw to read arbitrary files and directories on the remote host.

Solution

Upgrade to Ironmail version 6.1.1 as necessary and install HotFix-17, as described in the vendor advisory referenced above.

See Also

http://www.securityfocus.com/advisories/11308

Plugin Details

Severity: Medium

ID: 22901

File Name: ironwebmail_pathname_dir_traversal.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 10/20/2006

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 10/13/2006

Reference Information

CVE: CVE-2006-5210

BID: 20436