Vulnerabilities > CVE-2004-1130 - Remote vulnerability in Youngzsoft Cmailserver 5.2.0

047910
CVSS 6.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
youngzsoft
nessus

Summary

Cross-site scripting (XSS) vulnerability in admin.asp in CMailServer 5.2 allows remote attackers to execute arbitrary web script or HTML via personal information fields, such as (1) username, (2) name, or (3) comments. This vulnerability is addressed in the following product release: YoungZSoft, CMailServer, 5.2.1

Vulnerable Configurations

Part Description Count
Application
Youngzsoft
1

Nessus

NASL familySMTP problems
NASL idCMAIL_MULTIPLE.NASL
descriptionThe remote host is running YoungZSoft CMailServer, a mail server for Microsoft Windows. The version of CMailServer running on the remote machine has multiple vulnerabilities, including buffer overflow, SQL injection, and HTML injection. These vulnerabilities could allow a remote attacker to execute arbitrary code.
last seen2020-06-01
modified2020-06-02
plugin id15828
published2004-11-24
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15828
titleYoungzsoft CMailServer < 5.2.1 Multiple Remote Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if(description)
{
 script_id(15828);
 script_cve_id("CVE-2004-1128", "CVE-2004-1129", "CVE-2004-1130");
 script_bugtraq_id(11742);
 script_xref(name:"Secunia", value:"13298");

 script_version ("1.17");
 script_name(english:"Youngzsoft CMailServer < 5.2.1 Multiple Remote Vulnerabilities");
 script_summary(english:"Detects the version of CMail");
 
 script_set_attribute(
   attribute:"synopsis",
   value:"The remote mail server has multiple vulnerabilities."
 );
 script_set_attribute(attribute:"description", value:
"The remote host is running YoungZSoft CMailServer, a mail server
for Microsoft Windows.

The version of CMailServer running on the remote machine has multiple
vulnerabilities, including buffer overflow, SQL injection, and HTML
injection.  These vulnerabilities could allow a remote attacker to
execute arbitrary code." );
 script_set_attribute(
   attribute:"see_also",
   value:"https://seclists.org/bugtraq/2004/Nov/335"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Upgrade to CMailServer 5.2.1 or later."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/24");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/11/24");
 script_cvs_date("Date: 2018/11/15 20:50:24");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
 script_category(ACT_GATHER_INFO);
 script_family(english:"SMTP problems");
 
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 
 script_dependencie("find_service2.nasl");
 script_require_ports("Services/cmailserver-smtp");
 exit(0);
}

#
# The script code starts here
#
include("smtp_func.inc");
port = get_kb_item("Services/cmailserver-smtp");
if ( ! port ) exit(0);
banner = get_smtp_banner ( port:port);
if ( egrep(pattern:"^220 ESMTP CMailServer ([0-4]\..*|5\.([0-1]\..*|2\.0.*))SMTP Service Ready", string:banner) )
{
	security_hole ( port );
	set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
}