Vulnerabilities > CVE-2005-4559
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Application | 1 |
Exploit-Db
description | IceWarp Universal WebMail /mail/include.html Crafted HTTP_USER_AGENT Arbitrary File Access. CVE-2005-4559. Webapps exploit for php platform |
id | EDB-ID:26984 |
last seen | 2016-02-03 |
modified | 2005-12-27 |
published | 2005-12-27 |
reporter | Tan Chew Keong |
source | https://www.exploit-db.com/download/26984/ |
title | IceWarp Universal WebMail /mail/include.html - Crafted HTTP_USER_AGENT Arbitrary File Access |
Nessus
NASL family | CGI abuses |
NASL id | VISNETIC_MAILSERVER_FLAWS.NASL |
description | The remote host is running VisNetic / Merak Mail Server, a multi- featured mail server for Windows. The webmail and webadmin services included in the remote version of this software are prone to multiple flaws. An attacker could send specially crafted URLs to execute arbitrary scripts, perhaps taken from third-party hosts, or to disclose the content of files on the remote system. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20346 |
published | 2005-12-28 |
reporter | This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/20346 |
title | VisNetic / Merak Mail Server Multiple Remote Vulnerabilities |
code |
|
References
- http://marc.info/?l=full-disclosure&m=113570229524828&w=2
- http://marc.info/?l=full-disclosure&m=113570229524828&w=2
- http://secunia.com/advisories/17046
- http://secunia.com/advisories/17046
- http://secunia.com/advisories/17865
- http://secunia.com/advisories/17865
- http://secunia.com/secunia_research/2005-62/advisory/
- http://secunia.com/secunia_research/2005-62/advisory/
- http://securityreason.com/securityalert/299
- http://securityreason.com/securityalert/299
- http://securitytracker.com/id?1015412
- http://securitytracker.com/id?1015412
- http://www.osvdb.org/22082
- http://www.osvdb.org/22082
- http://www.securityfocus.com/archive/1/420255/100/0/threaded
- http://www.securityfocus.com/archive/1/420255/100/0/threaded
- http://www.securityfocus.com/bid/16069
- http://www.securityfocus.com/bid/16069
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23907
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23907