Some vulnerabilities and a security issue have been reported in MailScan for Mail Servers, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, and bypass certain security restrictions.
1) An input validation error within the web administration interface can be exploited to e.g. download arbitrary files via directory traversal attacks by sending specially crafted requests to the vulnerable service.
2) The web administration interface does not properly restrict access to certain pages. This can be exploited to bypass the authentication by e.g. accessing protected pages directly.
3) Input passed via the URL to the web administration interface is not properly sanitised before being returned to the user in case of an error. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected website.
Successful exploitation may require that the user's browser does not URL-encode the request (e.g. Internet Explorer).
The vulnerabilities are reported in MailScan for Mail Servers version 5.6.a with espatch1. Other versions may also be affected.
4) A security issue is caused due to insecure default file permissions being set on the installation directory. This can be exploited to gain escalated privileges e.g. by replacing certain EXE files in the directory.
This security issue is reported in MailScan for Mail Servers and MailScan for SMTP Servers version 5.6a with espatch1. Other versions may also be affected.
Solution: Do not browse other websites while being logged in to the web administration interface. Restrict access to trusted users only.
Provided and/or discovered by: 1 - 3) Oliver Karow
4) Edi Strosar
Original Advisory: http://www.oliverkarow.de/research/mailscan.txt
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: MailScan Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.