| VID |
18086 |
| Severity |
30 |
| Port |
25 |
| Protocol |
TCP |
| Class |
SMTP |
| Detailed Description |
The NetWin SurgeMail server, according to its banner, has multiple vulnerabilities. NetWin SurgeMail is a mail server for multiple operating systems. NetWin SurgeMail versions prior to 3.0c2 are vulnerable to a remote file upload vulnerability and a cross-site scripting vulnerability.
1) Remote file upload vulnerability: This vulnerability allows a remote attacker to upload arbitrary files to the server. A remote attacker could exploit this vulnerability to upload through manipulated request (attach_id parameter). 2) Cross-site scripting vulnerability: It is possible to inject javascript in auto-reply's header and subject fields. This may be exploited by an attacker to steal the Webmail administrator's cookies or to redirect the administrator's browser to malicious websites.
* Note: This check solely relied on the banner of the remote SMTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.security.org.sg/vuln/surgemail22g3.html
* Platforms Affected: NetWin, SurgeMail versions prior to 3.0c2 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of NetWin SurgeMail (3.0c2 or later), available from the NetWin SurgeMail Web site at http://www.netwinsite.com/cgi-bin/keycgi.exe?cmd=download&product=surgemail |
| Related URL |
CVE-2005-0845 (CVE) |
| Related URL |
12866 (SecurityFocus) |
| Related URL |
19804,19810,19813 (ISS) |
|