Kerio MailServer < 6.6.2 Multiple XSS (KSEC-2008-12-16-01)

medium Nessus Plugin ID 35258

Synopsis

The remote mail server is affected by several cross-site scripting vulnerabilities.

Description

According to its banner, the remote host is running a version of Kerio MailServer prior to 6.6.2. Multiple files in such versions are reportedly affected by cross-site scripting vulnerabilities.

- The application fails to sanitize input to the parameter 'folder' of the 'mailCompose.php' script as well as the parameter 'daytime' of the 'calendarEdit.php' script before using it to generate dynamic HTML.

- Content passed to 'sent' parameter of the 'error413.php' script is not sanitized before being returned to the user.

Successful exploitation of these issues could lead to execution of arbitrary HTML and script code in a user's browser within the security context of the affected site.

Solution

Upgrade to Kerio MailServer 6.6.2 or later.

See Also

http://www.kerio.com/security_advisory.html#0812

Plugin Details

Severity: Medium

ID: 35258

File Name: kerio_kms_662.nasl

Version: 1.15

Type: remote

Published: 12/22/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:kerio:kerio_mailserver

Required KB Items: kerio/port

Exploit Ease: No exploit is required

Reference Information

CVE: CVE-2008-5760, CVE-2008-5769

BID: 32863

CWE: 79

SECUNIA: 32955