IceWarp < 5.6.1 lang_settings Parameter Remote File Inclusion (deprecated)

Medium Nessus Network Monitor Plugin ID 3688


The remote host is vulnerable to a Script Injection attack.


The remote host is running IceWarp Web Mail, a webmail product written in PHP that is distributed as a standalone application and also bundled with VisNetic Mail Server and Merak Mail Server. The version of IceWarp Web Mail installed on the remote host fails to sanitize user-supplied input to the 'lang_settings' parameter of the 'accounts/inc/include.php' and 'admin/inc/include.php' scripts before using it to include PHP code. An unauthenticated attacker may be able to exploit these flaws to view arbitrary files on the remote host or to execute arbitrary PHP code after injecting it into the mail server's log file.


Upgrade to version 5.6.1 or higher.

See Also

Plugin Details

Severity: Medium

ID: 3688

File Name: 3688.prm

Family: CGI

Published: 2006/07/25

Modified: 2016/02/05

Dependencies: 1442

Nessus ID: 22079

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:U/RC:C


Base Score: 5.3

Temporal Score: 5.1


Temporal Vector: CVSS3#E:F/RL:U/RC:C

Reference Information

CVE: CVE-2006-0817, CVE-2006-0818

BID: 19007, 19002