Vulnerabilities > CVE-2007-2718

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
microsoft
stalker
nessus
exploit available

Summary

Cross-site scripting (XSS) vulnerability in the WebMail system in Stalker CommuniGate Pro 5.1.8 and earlier, when using Microsoft Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via crafted STYLE tags.

Vulnerable Configurations

Part Description Count
Application
Microsoft
1
Application
Stalker
1

Exploit-Db

descriptionCommuniGate Pro. CVE-2007-2718. Webapps exploit for php platform
idEDB-ID:30027
last seen2016-02-03
modified2007-05-12
published2007-05-12
reporterAlla Bezroutchko
sourcehttps://www.exploit-db.com/download/30027/
titleCommuniGate Pro 5.1.8 Web Mail HTML Injection Vulnerability

Nessus

NASL familyCGI abuses : XSS
NASL idCOMMUNIGATEPRO_519.NASL
descriptionAccording to its banner, the version of CommuniGate Pro running on the remote host fails to completely sanitize email messages, when using Internet Explorer (IE). A remote attacker may be able to leverage this issue to inject arbitrary HTML and script code into a user
last seen2020-06-01
modified2020-06-02
plugin id25215
published2007-05-14
reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/25215
titleCommuniGate Pro WebMail w/ MSIE STYLE Tag XSS
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(25215);
  script_version("1.19");

  script_cve_id("CVE-2007-2718");
  script_bugtraq_id(23950);

  script_name(english:"CommuniGate Pro WebMail w/ MSIE STYLE Tag XSS");
  script_summary(english:"Checks for CommuniGate Pro < 5.1.9");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by a cross-site scripting issue." );
 script_set_attribute(attribute:"description", value:
"According to its banner, the version of CommuniGate Pro running on the
remote host fails to completely sanitize email messages, when using 
Internet Explorer (IE).  A remote attacker may be able to leverage this 
issue to inject arbitrary HTML and script code into a user's browser to 
be evaluated within the security context of the affected website." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2007/May/187" );
 script_set_attribute(attribute:"see_also", value:"http://www.communigate.com/CommuniGatePro/History51.html" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to CommuniGate Pro version 5.1.9 or later." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2007/05/14");
 script_set_attribute(attribute:"vuln_publication_date", value: "2007/05/12");
 script_cvs_date("Date: 2018/11/15 20:50:19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:stalker:communigate_pro:5.1.8 and previous versions");
script_end_attributes();


  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses : XSS");

  script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_require_ports("Services/www", 8100);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:8100);

# Check the version in the banner.
banner = get_http_banner(port:port);
if (
  banner &&
  "Server: CommuniGatePro" >< banner &&
  egrep(pattern:"^Server: CommuniGatePro/([0-4]\.|5\.(0[^0-9]|1([^.]|\.[0-8]($|[^0-9]))))", string:banner)
) {
   security_warning(port);
   set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
}