Vulnerabilities > CVE-2004-1443 - Unspecified vulnerability in Horde IMP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN horde
nessus
Summary
Cross-site scripting (XSS) vulnerability in the inline MIME viewer in Horde-IMP (Internet Messaging Program) 3.2.4 and earlier, when used with Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via an e-mail message.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 19 |
Nessus
NASL family CGI abuses : XSS NASL id IMP_HTML_PLUS_TIME_XSS.NASL description The remote server is running at least one instance of IMP whose version number is 3.2.4 or lower. Such versions are vulnerable to a cross-scripting attack whereby an attacker may be able to inject arbitrary content, including script, in a specially crafted MIME message. To have an effect, the victim must be using Internet Explorer to access IMP and be using the inline MIME viewer for HTML messages. Note : Nessus has determined the vulnerability exists on the target simply by looking at the version number of IMP installed there, it has not attempted to actually exploit the vulnerability. last seen 2020-06-01 modified 2020-06-02 plugin id 13857 published 2004-07-30 reporter This script is Copyright (C) 2004-2018 George A. Theall source https://www.tenable.com/plugins/nessus/13857 title Horde IMP with MSIE MIME Viewer Email Message XSS code # # This script was written by George A. Theall, <[email protected]>. # # See the Nessus Scripts License for details. # # Changes by Tenable: # - Revised plugin title (4/30/09) # - Revised plugin title (8/13/12) include("compat.inc"); if (description) { script_id(13857); script_version ("1.24"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12"); script_cve_id("CVE-2004-1443"); script_bugtraq_id(10845); script_name(english:"Horde IMP with MSIE MIME Viewer Email Message XSS"); script_summary(english:"Checks for HTML+TIME Vulnerability in IMP"); script_set_attribute(attribute:"synopsis", value: "The remote web server is running a PHP application that is affected by a cross-site scripting vulnerability."); script_set_attribute(attribute:"description", value: "The remote server is running at least one instance of IMP whose version number is 3.2.4 or lower. Such versions are vulnerable to a cross-scripting attack whereby an attacker may be able to inject arbitrary content, including script, in a specially crafted MIME message. To have an effect, the victim must be using Internet Explorer to access IMP and be using the inline MIME viewer for HTML messages. Note : Nessus has determined the vulnerability exists on the target simply by looking at the version number of IMP installed there, it has not attempted to actually exploit the vulnerability."); script_set_attribute(attribute:"see_also", value:"http://www.greymagic.com/security/advisories/gm005-mc/"); script_set_attribute(attribute:"solution", value: "Upgrade to IMP version 3.2.5 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990); script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/30"); script_set_attribute(attribute:"vuln_publication_date", value:"2004/08/03"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:horde:imp"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2020 George A. Theall"); script_family(english:"CGI abuses : XSS"); script_dependencie("global_settings.nasl", "imp_detect.nasl"); script_require_ports("Services/www", 80); exit(0); } include("global_settings.inc"); include("http_func.inc"); host = get_host_name(); port = get_http_port(default:80, embedded:TRUE); if (debug_level) display("debug: searching for HTML+TIME XSS vulnerability in IMP on ", host, ":", port, ".\n"); if (!get_port_state(port)) exit(0); # Check each installed instance, stopping if we find a vulnerability. installs = get_kb_list(string("www/", port, "/imp")); if (isnull(installs)) exit(0); foreach install (installs) { matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$"); if (!isnull(matches)) { ver = matches[1]; dir = matches[2]; if (debug_level) display("debug: checking version ", ver, " under ", dir, ".\n"); if (ereg(pattern:"^(1\.|2\.|3\.(0|1|2|2\.[1-4]))$", string:ver)) { security_warning(port); set_kb_item(name: 'www/'+port+'/XSS', value: TRUE); exit(0); } } }
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200408-07.NASL description The remote host is affected by the vulnerability described in GLSA-200408-07 (Horde-IMP: Input validation vulnerability for Internet Explorer users) Horde-IMP fails to properly sanitize email messages that contain malicious HTML or script code so that it is not safe for users of Internet Explorer when using the inline MIME viewer for HTML messages. Impact : By enticing a user to read a specially crafted e-mail, an attacker can execute arbitrary scripts running in the context of the victim last seen 2020-06-01 modified 2020-06-02 plugin id 14563 published 2004-08-30 reporter This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/14563 title GLSA-200408-07 : Horde-IMP: Input validation vulnerability for Internet Explorer users code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200408-07. # # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(14563); script_version("1.16"); script_cvs_date("Date: 2019/08/02 13:32:41"); script_cve_id("CVE-2004-1443"); script_xref(name:"GLSA", value:"200408-07"); script_name(english:"GLSA-200408-07 : Horde-IMP: Input validation vulnerability for Internet Explorer users"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200408-07 (Horde-IMP: Input validation vulnerability for Internet Explorer users) Horde-IMP fails to properly sanitize email messages that contain malicious HTML or script code so that it is not safe for users of Internet Explorer when using the inline MIME viewer for HTML messages. Impact : By enticing a user to read a specially crafted e-mail, an attacker can execute arbitrary scripts running in the context of the victim's browser. This could lead to a compromise of the user's webmail account, cookie theft, etc. Workaround : Do not use Internet Explorer to access Horde-IMP." ); # http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&r2=1.389.2.109&ty=h script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?668f53c2" ); # http://secunia.com/advisories/12202/ script_set_attribute( attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/advisories/12202/" ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200408-07" ); script_set_attribute( attribute:"solution", value: "All Horde-IMP users should upgrade to the latest stable version: # emerge sync # emerge -pv '>=www-apps/horde-imp-3.2.5' # emerge '>=www-apps/horde-imp-3.2.5'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:horde-imp"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2004/08/10"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/08/30"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"www-apps/horde-imp", unaffected:make_list("ge 3.2.5"), vulnerable:make_list("le 3.2.4"))) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get()); else security_warning(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Horde-IMP"); }
References
- http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&r2=1.389.2.109&ty=h
- http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&r2=1.389.2.109&ty=h
- http://secunia.com/advisories/12202/
- http://secunia.com/advisories/12202/
- http://www.gentoo.org/security/en/glsa/glsa-200408-07.xml
- http://www.gentoo.org/security/en/glsa/glsa-200408-07.xml
- http://www.securityfocus.com/bid/10845
- http://www.securityfocus.com/bid/10845
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16866
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16866