Vulnerabilities > CVE-2005-0846 - Cross-Site Scripting vulnerability in Netwin Surgemail 2.2G3

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
netwin
nessus

Summary

Multiple cross-site scripting (XSS) vulnerabilities in the email auto-reply message in SurgeMail 2.2g3 allow remote attackers to inject arbitrary web script or HTML via the (1) message subject or (2) message header field.

Vulnerable Configurations

Part Description Count
Application
Netwin
1

Nessus

NASL familySMTP problems
NASL idNETWIN_SURGEMAIL_UNSPECIFIED_VULNS.NASL
descriptionThe remote host is running NetWin SurgeMail, a mail server application. The remote version of this software is affected by multiple unspecified vulnerabilities that have been disclosed by the vendor.
last seen2020-06-01
modified2020-06-02
plugin id17594
published2005-03-22
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/17594
titleNetWin SurgeMail Multiple Remote Unspecified Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include( 'compat.inc' );

if(description)
{
  script_id(17594);
  script_version ("1.15");

  script_cve_id("CVE-2005-0845", "CVE-2005-0846");
  script_bugtraq_id(12866);

  script_name(english:"NetWin SurgeMail Multiple Remote Unspecified Vulnerabilities");
  script_summary(english:"Checks the version of the remote NetWin server");

  script_set_attribute(
    attribute:'synopsis',
    value:'The remote service is vulnerable to multiple conditions.'
  );

  script_set_attribute(
    attribute:'description',
    value:"The remote host is running NetWin SurgeMail, a mail server
application. 

The remote version of this software is affected by multiple
unspecified vulnerabilities that have been disclosed by the vendor."
  );

  script_set_attribute(
    attribute:'solution',
    value: "Upgrade to NetWin SurgeMail 3.0.0c2 or newer."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(
    attribute:'see_also',
    value:'https://www.securityfocus.com/archive/1/394055'
  );

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/03/22");
 script_cvs_date("Date: 2018/11/15 20:50:24");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/03/22");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe",value:"cpe:/a:netwin:surgemail");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");

  script_family(english:"SMTP problems");
  script_dependencie("smtpserver_detect.nasl");
  script_require_ports("Services/smtp", 25);
  exit(0);
}

#
# The script code starts here
#

include("smtp_func.inc");

port = get_kb_item("Services/smtp");
if(!port)port = 25;

banner = get_smtp_banner(port:port);

if ( ! banner ) exit(0);

if ( egrep(string:banner, pattern:"^220.* SurgeSMTP \(Version ([0-2]\.|3\.0[ab]|3\.0c[01][^0-9])")) security_hole(port);