IceWarp < 5.6.1 lang_settings Parameter Remote File Inclusion (deprecated)

Medium Nessus Network Monitor Plugin ID 3688

Synopsis

The remote host is vulnerable to a Script Injection attack.

Description

The remote host is running IceWarp Web Mail, a webmail product written in PHP that is distributed as a standalone application and also bundled with VisNetic Mail Server and Merak Mail Server. The version of IceWarp Web Mail installed on the remote host fails to sanitize user-supplied input to the 'lang_settings' parameter of the 'accounts/inc/include.php' and 'admin/inc/include.php' scripts before using it to include PHP code. An unauthenticated attacker may be able to exploit these flaws to view arbitrary files on the remote host or to execute arbitrary PHP code after injecting it into the mail server's log file.

Solution

Upgrade to version 5.6.1 or higher.

See Also

http://secunia.com/secunia_research/2006-14/advisory

http://secunia.com/secunia_research/2006-12/advisory

Plugin Details

Severity: Medium

ID: 3688

File Name: 3688.prm

Family: CGI

Published: 2006/07/25

Modified: 2016/02/05

Dependencies: 1442

Nessus ID: 22079

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:U/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS3#E:F/RL:U/RC:C

Reference Information

CVE: CVE-2006-0817, CVE-2006-0818

BID: 19007, 19002