MDaemon WorldClient < 10.0.2 Email Handling XSS

medium Nessus Plugin ID 34849

Synopsis

The remote mail server is prone to a script injection attack.

Description

The remote host is running Alt-N MDaemon, a mail server for Windows.

According to its banner, a version of MDaemon mail server older than 10.0.2 is installed on the remote host. Such versions ship with a version of WorldClient (a webmail client) that is affected by a script injection vulnerability. By tricking a user into opening a specially crafted email, an attacker can exploit this issue to execute script code in the user's browser in the security context of the affected application and thereby steal cookie-based credentials or launch other attacks.

Solution

Upgrade to MDaemon 10.0.2 or later.

See Also

http://files.altn.com/MDaemon/Release/RelNotes_en.html

Plugin Details

Severity: Medium

ID: 34849

File Name: mdaemon_worldclient_1002.nasl

Version: 1.20

Type: remote

Published: 11/21/2008

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

Exploit Ease: No exploit is required

Reference Information

CVE: CVE-2008-6967

BID: 32355

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990

Secunia: 32142