Vulnerabilities > CVE-2004-1443 - HTML Injection vulnerability in Horde IMP HTML+TIME

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
horde
nessus

Summary

Cross-site scripting (XSS) vulnerability in the inline MIME viewer in Horde-IMP (Internet Messaging Program) 3.2.4 and earlier, when used with Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via an e-mail message.

Nessus

  • NASL familyCGI abuses : XSS
    NASL idIMP_HTML_PLUS_TIME_XSS.NASL
    descriptionThe remote server is running at least one instance of IMP whose version number is 3.2.4 or lower. Such versions are vulnerable to a cross-scripting attack whereby an attacker may be able to inject arbitrary content, including script, in a specially crafted MIME message. To have an effect, the victim must be using Internet Explorer to access IMP and be using the inline MIME viewer for HTML messages. Note : Nessus has determined the vulnerability exists on the target simply by looking at the version number of IMP installed there, it has not attempted to actually exploit the vulnerability.
    last seen2020-06-01
    modified2020-06-02
    plugin id13857
    published2004-07-30
    reporterThis script is Copyright (C) 2004-2018 George A. Theall
    sourcehttps://www.tenable.com/plugins/nessus/13857
    titleHorde IMP with MSIE MIME Viewer Email Message XSS
    code
    #
    # This script was written by George A. Theall, <[email protected]>.
    #
    # See the Nessus Scripts License for details.
    #
    
    # Changes by Tenable:
    # - Revised plugin title (4/30/09)
    # - Revised plugin title (8/13/12)
    
    
    include("compat.inc");
    
    if (description)
    {
      script_id(13857);
      script_version ("1.24");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
    
      script_cve_id("CVE-2004-1443");
      script_bugtraq_id(10845);
    
      script_name(english:"Horde IMP with MSIE MIME Viewer Email Message XSS");
      script_summary(english:"Checks for HTML+TIME Vulnerability in IMP");
     
      script_set_attribute(attribute:"synopsis", value:
    "The remote web server is running a PHP application that is affected by
    a cross-site scripting vulnerability.");
      script_set_attribute(attribute:"description", value:
    "The remote server is running at least one instance of IMP whose 
    version number is 3.2.4 or lower.  Such versions are vulnerable to a
    cross-scripting attack whereby an attacker may be able to inject 
    arbitrary content, including script, in a specially crafted MIME
    message.  To have an effect, the victim must be using Internet 
    Explorer to access IMP and be using the inline MIME viewer for HTML 
    messages. 
    
    Note : Nessus has determined the vulnerability exists on the target
    simply by looking at the version number of IMP installed there, it has
    not attempted to actually exploit the vulnerability.");
      script_set_attribute(attribute:"see_also", value:"http://www.greymagic.com/security/advisories/gm005-mc/");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to IMP version 3.2.5 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/30");
      script_set_attribute(attribute:"vuln_publication_date", value:"2004/08/03");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:horde:imp");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2020 George A. Theall");
    
      script_family(english:"CGI abuses : XSS");
    
      script_dependencie("global_settings.nasl", "imp_detect.nasl");
      script_require_ports("Services/www", 80);
    
      exit(0);
    }
    
    include("global_settings.inc");
    include("http_func.inc");
    
    host = get_host_name();
    port = get_http_port(default:80, embedded:TRUE);
    if (debug_level) display("debug: searching for HTML+TIME XSS vulnerability in IMP on ", host, ":", port, ".\n");
    
    if (!get_port_state(port)) exit(0);
    
    # Check each installed instance, stopping if we find a vulnerability.
    installs = get_kb_list(string("www/", port, "/imp"));
    if (isnull(installs)) exit(0);
    foreach install (installs) {
      matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
      if (!isnull(matches)) {
        ver = matches[1];
        dir = matches[2];
        if (debug_level) display("debug: checking version ", ver, " under ", dir, ".\n");
    
        if (ereg(pattern:"^(1\.|2\.|3\.(0|1|2|2\.[1-4]))$", string:ver)) {
          security_warning(port);
          set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
          exit(0);
        }
      }
    }
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200408-07.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200408-07 (Horde-IMP: Input validation vulnerability for Internet Explorer users) Horde-IMP fails to properly sanitize email messages that contain malicious HTML or script code so that it is not safe for users of Internet Explorer when using the inline MIME viewer for HTML messages. Impact : By enticing a user to read a specially crafted e-mail, an attacker can execute arbitrary scripts running in the context of the victim
    last seen2020-06-01
    modified2020-06-02
    plugin id14563
    published2004-08-30
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/14563
    titleGLSA-200408-07 : Horde-IMP: Input validation vulnerability for Internet Explorer users
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 200408-07.
    #
    # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(14563);
      script_version("1.16");
      script_cvs_date("Date: 2019/08/02 13:32:41");
    
      script_cve_id("CVE-2004-1443");
      script_xref(name:"GLSA", value:"200408-07");
    
      script_name(english:"GLSA-200408-07 : Horde-IMP: Input validation vulnerability for Internet Explorer users");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-200408-07
    (Horde-IMP: Input validation vulnerability for Internet Explorer users)
    
        Horde-IMP fails to properly sanitize email messages that contain
        malicious HTML or script code so that it is not safe for users of
        Internet Explorer when using the inline MIME viewer for HTML messages.
      
    Impact :
    
        By enticing a user to read a specially crafted e-mail, an attacker can
        execute arbitrary scripts running in the context of the victim's
        browser. This could lead to a compromise of the user's webmail account,
        cookie theft, etc.
      
    Workaround :
    
        Do not use Internet Explorer to access Horde-IMP."
      );
      # http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&r2=1.389.2.109&ty=h
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?668f53c2"
      );
      # http://secunia.com/advisories/12202/
      script_set_attribute(
        attribute:"see_also",
        value:"https://secuniaresearch.flexerasoftware.com/advisories/12202/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/200408-07"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All Horde-IMP users should upgrade to the latest stable version:
        # emerge sync
        # emerge -pv '>=www-apps/horde-imp-3.2.5'
        # emerge '>=www-apps/horde-imp-3.2.5'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:horde-imp");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2004/08/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/08/30");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"www-apps/horde-imp", unaffected:make_list("ge 3.2.5"), vulnerable:make_list("le 3.2.4"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Horde-IMP");
    }