Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Published: 2005-02-09
Updated: 2016-10-18
Summary
Multiple directory traversal vulnerabilities in ArGoSoft Mail Server 1.8.7.3 allow remote authenticated users to read, delete, or upload arbitrary files via a .. (dot dot) in (1) the filename of an e-mail attachment, (2) the _msgatt.rec file, (3) and the /msg, /delete, /folderadd, and /folderdelete operations for the Folder parameter.
Vulnerable Configurations
Part | Description | Count |
Application | Argosoft | 1 |
Nessus
NASL family | CGI abuses |
NASL id | ARGOSOFT_DIR_TRAVERSAL.NASL |
description | The remote host is running the ArGoSoft WebMail interface. There are multiple flaws in this interface that may allow an authenticated attacker to read arbitrary files on the remote server and create / delete arbitrary directories on the affected host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 16364 |
published | 2005-02-10 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/16364 |
title | ArGoSoft Mail Server Multiple Traversals |
code | #
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if(description)
{
script_id(16364);
script_version("1.15");
script_cve_id("CVE-2005-0367");
script_bugtraq_id(12502);
name["english"] = "ArGoSoft Mail Server Multiple Traversals";
script_name(english:name["english"]);
script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by a directory traversal
vulnerability." );
script_set_attribute(attribute:"description", value:
"The remote host is running the ArGoSoft WebMail interface. There are
multiple flaws in this interface that may allow an authenticated
attacker to read arbitrary files on the remote server and create /
delete arbitrary directories on the affected host." );
script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/389866" );
script_set_attribute(attribute:"solution", value:
"Upgrade to ArGoSoft 1.8.7.4 or later." );
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_publication_date", value: "2005/02/10");
script_set_attribute(attribute:"vuln_publication_date", value: "2005/02/09");
script_cvs_date("Date: 2018/11/15 20:50:16");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();
summary["english"] = "Gets the version of the remote ArGoSoft server";
script_summary(english:summary["english"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
family["english"] = "CGI abuses";
script_family(english:family["english"]);
script_dependencie("http_version.nasl");
script_require_ports("Services/www", 80);
exit(0);
}
# Check starts here
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:80);
res = http_get_cache(item:"/", port:port, exit_on_fail: 1);
if((vers = egrep(pattern:".*ArGoSoft Mail Server.*Version", string:res)))
{
if(ereg(pattern:".*Version.*\((0\.|1\.([0-7]\.|8\.([0-6]\.|7\.[0-3])))\)",
string:vers))security_warning(port);
}
|