Vulnerabilities > CVE-2001-1286 - Unspecified vulnerability in Ipswitch Imail 6.0.2/6.0.6/7.0.4

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
ipswitch
nessus

Summary

Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control.

Vulnerable Configurations

Part Description Count
Application
Ipswitch
3

Nessus

NASL familyCGI abuses
NASL idIPSWITCH_IMAIL_VERSION.NASL
descriptionThe remote host is running IMail web interface. In this version, the session is maintained via the URL. It will be disclosed in the Referer field if you receive an email with external links (e.g. images)
last seen2020-06-02
modified2003-02-25
plugin id11271
published2003-02-25
reporterThis script is Copyright (C) 2003-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/11271
titleIpswitch IMail Web Interface URI Referer Session Token Disclosure
code
#
# (C) Tenable Network Security, Inc.
#

# References:
#
# http://www.nessus.org/u?fd6d1531
#
# Date:  Sun, 10 Mar 2002 21:37:33 +0100
# From: "Obscure" <[email protected]>
# To: [email protected], [email protected]
# Subject: IMail Account hijack through the Web Interface
#
#  Date:  Mon, 11 Mar 2002 04:11:43 +0000 (GMT)
# From: "Zillion" <[email protected]>
# To: "Obscure" <[email protected]>
# CC: [email protected], [email protected], "Obscure" <[email protected]>
# Subject: Re: IMail Account hijack through the Web Interface
#



include("compat.inc");

if(description)
{
 script_id(11271);
 script_version("1.19");

 script_cve_id("CVE-2001-1286");
 script_bugtraq_id(3432);
 
 script_name(english:"Ipswitch IMail Web Interface URI Referer Session Token Disclosure");
 script_summary(english:"Checks for version of IMail web interface");

 script_set_attribute(attribute:"synopsis", value:
"The remote mail server is affected by an information disclosure 
vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running IMail web interface. In this version, the
session is maintained via the URL. It will be disclosed in the 
Referer field if you receive an email with external links (e.g. images)" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2001/Oct/82" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/164" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/165" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/206" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Mar/221" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to IMail 7.06  or turn off the 'ignore source address 
in security check' option." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/02/25");
 script_set_attribute(attribute:"vuln_publication_date", value: "2001/10/11");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/01");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:ipswitch:imail"); 
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"CGI abuses");

 script_dependencie("find_service1.nasl", "no404.nasl", "http_version.nasl");
 #script_require_keys("www/IMail");
 script_require_ports("Services/www", 80);
 exit(0);
}

# The script code starts here

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);

banner = get_http_banner(port: port);
if (isnull(banner)) exit(1, "Failed to get the banner from port "+port+".");

serv = egrep(string: banner, pattern: "^Server:.*");
if(serv && ereg(pattern:"^Server:.*Ipswitch-IMail/(([1-6]\.)|(7\.0[0-5]))", string:serv))
   security_warning(port);