Merak Mail < 9.0.0 BODY Element HTML Injection

medium Nessus Network Monitor Plugin ID 4217

Synopsis

The remote host is vulnerable to an HTML injection attack.

Description

There is a flaw in this version of Merak mail server. Specifically, the application fails to filter out dangerous script input to email. An attacker may be able to execute arbitrary code when the user accesses Merak via the webmail interface. Successful exploitation would result in the attacker executing code in the remote client browser.

Solution

Upgrade to version 9.0.0 or higher.

See Also

http://www.mwrinfosecurity.com/publications/mwri_merak-webmail-xss-advisory_2008-09-17.pdf

Plugin Details

Severity: Medium

ID: 4217

Family: SMTP Servers

Published: 9/19/2007

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.7

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:icewarp:merak_mail_server

Reference Information

CVE: CVE-2007-5046

BID: 25708