Vulnerabilities > CVE-2005-4567 - Remote vulnerability in Floosietek Ftgate 4.4Build4.4.000

047910
CVSS 5.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
NONE
network
floosietek
nessus

Summary

Multiple cross-site scripting (XSS) vulnerabilities in FTGate Technology (formerly known as Floosietek) FTGate 4.4 (Build 4.4.000 Oct 26 2005) allow remote attackers to inject arbitrary web script or HTML by sending (1) the href parameter to index.fts, or the param1 parameter to (2) /domains/index.fts, (3) /config/licence.fts, or (4) /config/systemacl.fts.

Vulnerable Configurations

Part Description Count
Application
Floosietek
1

Nessus

NASL familyCGI abuses
NASL idFTGATE_44002.NASL
descriptionThe remote host appears to be running a version of FTGate, a commercial groupware mail server for Windows from FTGate Technology Ltd. The web server used to administer FTGate on the remote host fails to sanitize input to the
last seen2020-06-01
modified2020-06-02
plugin id20337
published2005-12-21
reporterThis script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/20337
titleFTGate <= 4.4.002 Multiple Remote Vulnerabilities (OF, FS, XSS)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) {
  script_id(20337);
  script_version("1.23");

  script_cve_id("CVE-2005-4567", "CVE-2005-4568", "CVE-2005-4569");
  script_bugtraq_id(15972);

  script_name(english:"FTGate <= 4.4.002 Multiple Remote Vulnerabilities (OF, FS, XSS)");
  script_summary(english:"Checks for multiple vulnerabilities in FTGate <= 4.4.002");

 script_set_attribute(attribute:"synopsis", value:
"The remote mail server is affected by multiple flaws." );
 script_set_attribute(attribute:"description", value:
"The remote host appears to be running a version of FTGate, a
commercial groupware mail server for Windows from FTGate Technology
Ltd. 

The web server used to administer FTGate on the remote host fails to
sanitize input to the 'href' parameter of the 'index.fts' script
before using it to generate dynamic content.  An unauthenticated
attacker can leverage this flaw to inject arbitrary HTML and script
code into a user's browser, to be evaluated within the security
context of the affected application. 

In addition, there reportedly is a buffer overflow vulnerability in
the web server as well as several format string vulnerabilities in the
accompanying IMAP and POP3 services.  An unauthenticated attacker may
be able to exploit these issues to execute code on the affected host." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2005/Dec/1038" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2005/Dec/1040" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2005/Dec/1041" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2005/Dec/1042" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to FTGate version 4.4.004 or later as it reportedly fixes
these issues." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/12/21");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/12/20");
 script_cvs_date("Date: 2018/11/15 20:50:17");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");
  script_copyright(english:"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("http_version.nasl", "cross_site_scripting.nasl");
  script_require_ports("Services/www", 8089);

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("url_func.inc");


port = get_http_port(default:8089, embedded: 1);
if (get_kb_item("www/" + port + "/generic_xss")) exit(0);


# nb: the web server doesn't have a banner.

xss = '<script>alert("' + SCRIPT_NAME + '")</script>;';

# nb: FTGate apparently filters url-encode characters 
#     unless they're upper-case.
test_cgi_xss(port: port, cgi: "/item.fts", high_risk: 1,
  pass_str: string('NAME="href" VALUE="">', xss), 
  pass2_re: "TITLE>FTGate Web Admin",
  qs:  string("href=", urlencode(str:string('">', xss), case_type:HEX_UPPERCASE)));