Vulnerabilities > CVE-2006-0818 - File Include vulnerability in VisNetic Mail Server

047910
CVSS 4.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
deerfield
icewarp
merak
nessus

Summary

Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558.

Vulnerable Configurations

Part Description Count
Application
Deerfield
1
Application
Icewarp
1
Application
Merak
1

Nessus

NASL familyCGI abuses
NASL idICEWARP_LANG_SETTINGS_FILE_INCLUDES.NASL
descriptionThe remote host is running IceWarp Web Mail, a webmail product written in PHP that is distributed as a standalone application and is also bundled with VisNetic Mail Server and Merak Mail Server. The version of IceWarp Web Mail installed on the remote host fails to sanitize user-supplied input to the
last seen2020-06-01
modified2020-06-02
plugin id22079
published2006-07-20
reporterThis script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/22079
titleIceWarp Multiple Script Remote File Inclusion