IceWarp < 5.6.1 lang_settings Parameter Remote File Inclusion (deprecated)

medium Nessus Network Monitor Plugin ID 3688

Synopsis

The remote host is vulnerable to a Script Injection attack.

Description

The remote host is running IceWarp Web Mail, a webmail product written in PHP that is distributed as a standalone application and also bundled with VisNetic Mail Server and Merak Mail Server. The version of IceWarp Web Mail installed on the remote host fails to sanitize user-supplied input to the 'lang_settings' parameter of the 'accounts/inc/include.php' and 'admin/inc/include.php' scripts before using it to include PHP code. An unauthenticated attacker may be able to exploit these flaws to view arbitrary files on the remote host or to execute arbitrary PHP code after injecting it into the mail server's log file.

Solution

Upgrade to version 5.6.1 or higher.

See Also

http://secunia.com/secunia_research/2006-14/advisory

http://secunia.com/secunia_research/2006-12/advisory

Plugin Details

Severity: Medium

ID: 3688

Family: CGI

Published: 7/25/2006

Updated: 3/6/2019

Nessus ID: 22079

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:C

Reference Information

CVE: CVE-2006-0817, CVE-2006-0818

BID: 19007, 19002