Vulnerabilities > CVE-2002-0738 - Unspecified vulnerability in Mhonarc 2.5/2.5.1/2.5.2

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
mhonarc
nessus

Summary

MHonArc 2.5.2 and earlier does not properly filter Javascript from archived e-mail messages, which could allow remote attackers to execute script in web clients by (1) splitting the SCRIPT tag into smaller pieces, (2) including the script in a SRC argument to an IMG tag, or (3) using "&={script}" syntax.

Vulnerable Configurations

Part Description Count
Application
Mhonarc
3

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-163.NASL
    descriptionJason Molenda and Hiromitsu Takagi foundways to exploit cross site scripting bugs in mhonarc, a mail to HTML converter. When processing maliciously crafted mails of type text/html mhonarc does not deactivate all scripting parts properly. This is fixed in upstream version 2.5.3. If you are worried about security, it is recommended that you disable support of text/html messages in your mail archives. There is no guarantee that the mhtxthtml.pl library is robust enough to eliminate all possible exploits that can occur with HTML data. To exclude HTML data, you can use the MIMEEXCS resource. For example : <MIMEExcs> text/html text/x-html </MIMEExcs> The type
    last seen2020-06-01
    modified2020-06-02
    plugin id15000
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15000
    titleDebian DSA-163-1 : mhonarc - XSS
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-163. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(15000);
      script_version("1.20");
      script_cvs_date("Date: 2019/08/02 13:32:17");
    
      script_cve_id("CVE-2002-0738");
      script_bugtraq_id(4546);
      script_xref(name:"DSA", value:"163");
    
      script_name(english:"Debian DSA-163-1 : mhonarc - XSS");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Jason Molenda and Hiromitsu Takagi foundways to exploit cross site
    scripting bugs in mhonarc, a mail to HTML converter. When processing
    maliciously crafted mails of type text/html mhonarc does not
    deactivate all scripting parts properly. This is fixed in upstream
    version 2.5.3.
    
    If you are worried about security, it is recommended that you disable
    support of text/html messages in your mail archives. There is no
    guarantee that the mhtxthtml.pl library is robust enough to eliminate
    all possible exploits that can occur with HTML data.
    
    To exclude HTML data, you can use the MIMEEXCS resource. For example :
    
        <MIMEExcs> text/html text/x-html </MIMEExcs>
    
    The type 'text/x-html' is probably not used any more, but is good to
    include it, just-in-case.
    
    If you are concerned that this could block out the entire contents of
    some messages, then you could do the following instead :
    
        <MIMEFilters> text/html; m2h_text_plain::filter; mhtxtplain.pl
        text/x-html; m2h_text_plain::filter; mhtxtplain.pl </MIMEFilters>
    
    This treats the HTML as text/plain.
    
    The above problems have been fixed in version 2.5.2-1.1 for the
    current stable distribution (woody), in version 2.4.4-1.1 for the old
    stable distribution (potato) and in version 2.5.11-1 for the unstable
    distribution (sid)."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://online.securityfocus.com/archive/1/268455"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2002/dsa-163"
      );
      script_set_attribute(attribute:"solution", value:"Upgrade the mhonarc packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:mhonarc");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:2.2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2002/09/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
      script_set_attribute(attribute:"vuln_publication_date", value:"2002/04/19");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"2.2", prefix:"mhonarc", reference:"2.4.4-1.1")) flag++;
    if (deb_check(release:"3.0", prefix:"mhonarc", reference:"2.5.2-1.1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyCGI abuses : XSS
    NASL idTORTURE_CGI_CROSS_SITE_SCRIPTING2.NASL
    descriptionThe remote web server hosts CGI scripts that fail to adequately sanitize request strings of malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user
    last seen2020-06-01
    modified2020-06-02
    plugin id47831
    published2010-07-26
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47831
    titleCGI Generic XSS (comprehensive test)