WinGate < 6.1.4 Build 1099 IMAP Service Traversal Arbitrary Mail Access

medium Nessus Network Monitor Plugin ID 3681

Synopsis

The remote host is vulnerable to a Directory Traversal flaw.

Description

The remote host appears to be running WinGate Proxy Server, a Windows application for managing and securing Internet access. According to its banner, the version of WinGate installed on the remote host is affected by a directory traversal flaw in its IMAP service. An attacker exploiting this flaw would only need to be able to connect to the IMAP service port, authenticate and issue a malformed request. Successful exploitation would lead to a loss of confidential data.

Solution

Upgrade to version 6.1.4 Build 1099 or higher.

See Also

http://www.wingate.com/download.php

Plugin Details

Severity: Medium

ID: 3681

Family: Web Servers

Published: 7/10/2006

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5.2

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:qbik:wingate

Reference Information

CVE: CVE-2006-2917

BID: 18908