ArGoSoft Mail Server < 1.8.7.4 HTML Injection

medium Nessus Network Monitor Plugin ID 2606

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.

Description

The remote host is running the ArGoSoft Mail Server. This version of ArGoSoft is prone to several vulnerabilities. Specifically, an attacker can use a directory traversal attack to gain access to sensitive data. Further, an attacker can add or delete folders. Note: Both of these vulnerabilities would require that the attacker have a valid user account.

Solution

Upgrade to version 1.8.7.4 or higher.

See Also

http://www.securityfocus.com/archive/1/389866

Plugin Details

Severity: Medium

ID: 2606

Family: SMTP Servers

Published: 2/10/2005

Updated: 3/6/2019

Nessus ID: 16364

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 6

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Reference Information

CVE: CVE-2005-0367

BID: 12502