ArGoSoft Mail Server < 1.8.7.4 HTML Injection

Medium Nessus Network Monitor Plugin ID 2606

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.

Description

The remote host is running the ArGoSoft Mail Server. This version of ArGoSoft is prone to several vulnerabilities. Specifically, an attacker can use a directory traversal attack to gain access to sensitive data. Further, an attacker can add or delete folders. Note: Both of these vulnerabilities would require that the attacker have a valid user account.

Solution

Upgrade to version 1.8.7.4 or higher.

See Also

http://www.securityfocus.com/archive/1/389866

Plugin Details

Severity: Medium

ID: 2606

File Name: 2606.prm

Family: SMTP Servers

Published: 2005/02/10

Modified: 2016/01/21

Dependencies: 2004, 2005

Nessus ID: 16364

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSSv3

Base Score: 6.3

Temporal Score: 6

Vector: CVSS3#AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:H/RL:O/RC:C

Reference Information

BID: 12502