Vulnerabilities > CVE-2007-3171 - Unspecified vulnerability in Uebimiau 2.7.10/2.7.2/2.7.9

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
uebimiau
nessus
exploit available

Summary

Uebimiau Webmail allows remote attackers to obtain sensitive information via a request to demo/pop3/error.php with an invalid value of the (1) smarty or (2) selected_theme parameter, which reveals the path in various error messages.

Vulnerable Configurations

Part Description Count
Application
Uebimiau
3

Exploit-Db

descriptionUebiMiau 2.7.10 demo/pop3/error.php Multiple Variable Path Disclosure. CVE-2007-3171 . Webapps exploit for php platform
idEDB-ID:30098
last seen2016-02-03
modified2007-05-29
published2007-05-29
reporterMichal Majchrowicz
sourcehttps://www.exploit-db.com/download/30098/
titleUebiMiau <= 2.7.10 demo/pop3/error.php Multiple Variable Path Disclosure

Nessus

NASL familyCGI abuses
NASL idUEBIMIAU_SELECTED_THEME_XSS.NASL
descriptionThe remote host is running UebiMiau, a webmail application written in PHP. The version of UebiMiau installed on the remote host fails to sanitize user input to the
last seen2020-06-01
modified2020-06-02
plugin id25345
published2007-05-30
reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/25345
titleUebiMiau Multiple Input Validation Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(25345);
  script_version("1.20");

  script_cve_id("CVE-2007-3170", "CVE-2007-3171", "CVE-2007-3172");
  script_bugtraq_id(24210);

  script_name(english:"UebiMiau Multiple Input Validation Vulnerabilities");
  script_summary(english:"Checks for an XSS flaw in UebiMiau");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP script that is susceptible to
multiple attacks." );
 script_set_attribute(attribute:"description", value:
"The remote host is running UebiMiau, a webmail application written in
PHP. 

The version of UebiMiau installed on the remote host fails to sanitize
user input to the 'selected_theme' parameter of the 'error.php' script
before using it as a template to generate dynamic HTML.  An
unauthenticated attacker may be able to leverage this issue to
disclose information about files or directories or to launch a cross-
site script attack against the affected application." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2007/May/511");
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2007/05/30");
 script_set_attribute(attribute:"vuln_publication_date", value: "2007/05/28");
 script_cvs_date("Date: 2018/11/15 20:50:19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();


  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl", "cross_site_scripting.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);
  script_require_keys("www/PHP");
  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("url_func.inc");


port = get_http_port(default:80, embedded: 0);
if (!can_host_php(port:port)) exit(0);
if (get_kb_item("www/"+port+"/generic_xss")) exit(0);


# A simple alert.
xss = raw_string("<script>alert(", SCRIPT_NAME, ")</script>");
exss = urlencode(str:xss);


# Loop through various directories.
if (thorough_tests) dirs = list_uniq(make_list("/webmail", "/uebimiau", cgi_dirs()));
else dirs = make_list(cgi_dirs());

foreach dir (dirs)
{
  # Try to exploit the issue.
  r = http_send_recv3(method:"GET", port: port,
    item:string( dir, "/error.php?",  "selected_theme=", exss) );
  if (isnull(r)) exit(0);
  res = r[2];

  # There's a problem if we see our exploit.
  if (string('unable to read template resource: "', xss, "/error.htm") >< res)
  {
    security_warning(port);
    set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
    exit(0);
  }
}