Attack vector
NETWORK Attack complexity
HIGH Privileges required
SINGLE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL network
high complexity
alt-n
nessus
Published: 2006-09-07
Updated: 2018-10-17
Summary
The useredit_account.wdm module in Alt-N WebAdmin 3.2.5 running with MDaemon 9.0.6, and possibly earlier versions, allows remote authenticated domain administrators to gain privileges and obtain access to the system mail queue by modifying the mailbox of the MDaemon user account to use the mailbox of another account. Successful exploitation requires that the attacker is already a Domain administrator within the default domain of a MDaemon server. This vulnerability is addressed in the following product release: Alt-N, WebAdmin, 3.2.6
Vulnerable Configurations
Part | Description | Count |
Application | Alt-N | 5 |
Nessus
NASL family | CGI abuses |
NASL id | WEBADMIN_326.NASL |
description | The remote host is running WebAdmin, a web-based remote administration tool for Alt-N MDaemon. According to its banner, the installed version of WebAdmin enables a domain administrator within the default domain to hijack the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22306 |
published | 2006-09-05 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22306 |
title | WebAdmin < 3.2.6 MDaemon Account Hijacking |