Vulnerabilities > CVE-2001-1286 - Unspecified vulnerability in Ipswitch Imail 6.0.2/6.0.6/7.0.4

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
ipswitch
nessus

Summary

Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control.

Vulnerable Configurations

Part Description Count
Application
Ipswitch
3

Nessus

NASL familyCGI abuses
NASL idIPSWITCH_IMAIL_VERSION.NASL
descriptionThe remote host is running IMail web interface. In this version, the session is maintained via the URL. It will be disclosed in the Referer field if you receive an email with external links (e.g. images)
last seen2020-06-02
modified2003-02-25
plugin id11271
published2003-02-25
reporterThis script is Copyright (C) 2003-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/11271
titleIpswitch IMail Web Interface URI Referer Session Token Disclosure
code
#
# (C) Tenable Network Security, Inc.
#

# References:
#
# http://www.nessus.org/u?fd6d1531
#
# Date:  Sun, 10 Mar 2002 21:37:33 +0100
# From: "Obscure" <[email protected]>
# To: [email protected], [email protected]
# Subject: IMail Account hijack through the Web Interface
#
#  Date:  Mon, 11 Mar 2002 04:11:43 +0000 (GMT)
# From: "Zillion" <[email protected]>
# To: "Obscure" <[email protected]>
# CC: [email protected], [email protected], "Obscure" <[email protected]>
# Subject: Re: IMail Account hijack through the Web Interface
#



include("compat.inc");

if(description)
{
 script_id(11271);
 script_version("1.19");

 script_cve_id("CVE-2001-1286");
 script_bugtraq_id(3432);
 
 script_name(english:"Ipswitch IMail Web Interface URI Referer Session Token Disclosure");
 script_summary(english:"Checks for version of IMail web interface");

 script_set_attribute(attribute:"synopsis", value:
"The remote mail server is affected by an information disclosure 
vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running IMail web interface. In this version, the
session is maintained via the URL. It will be disclosed in the 
Referer field if you receive an email with external links (e.g. images)" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2001/Oct/82" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/164" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/165" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/206" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/221" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to IMail 7.06  or turn off the 'ignore source address 
in security check' option." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/02/25");
 script_set_attribute(attribute:"vuln_publication_date", value: "2001/10/11");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/01");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:ipswitch:imail"); 
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"CGI abuses");

 script_dependencie("find_service1.nasl", "no404.nasl", "http_version.nasl");
 #script_require_keys("www/IMail");
 script_require_ports("Services/www", 80);
 exit(0);
}

# The script code starts here

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);

banner = get_http_banner(port: port);
if (isnull(banner)) exit(1, "Failed to get the banner from port "+port+".");

serv = egrep(string: banner, pattern: "^Server:.*");
if(serv && ereg(pattern:"^Server:.*Ipswitch-IMail/(([1-6]\.)|(7\.0[0-5]))", string:serv))
   security_warning(port);