fkie_cve-2011-3579
Vulnerability from fkie_nvd
Published
2011-09-30 17:55
Modified
2024-11-21 01:30
Severity ?
Summary
server/webmail.php in IceWarp WebMail in IceWarp Mail Server before 10.3.3 allows remote attackers to read arbitrary files, and possibly send HTTP requests to intranet servers or cause a denial of service (CPU and memory consumption), via an XML external entity declaration in conjunction with an entity reference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
icewarp | mail_server | * | |
icewarp | mail_server | 9.3.0 | |
icewarp | mail_server | 9.3.1 | |
icewarp | mail_server | 9.3.2 | |
icewarp | mail_server | 9.4.0 | |
icewarp | mail_server | 9.4.1 | |
icewarp | mail_server | 9.4.2 | |
icewarp | mail_server | 10.0.3 | |
icewarp | mail_server | 10.0.4 | |
icewarp | mail_server | 10.0.7 | |
icewarp | mail_server | 10.0.8 | |
icewarp | mail_server | 10.1.1 | |
icewarp | mail_server | 10.1.2 | |
icewarp | mail_server | 10.1.3 | |
icewarp | mail_server | 10.1.4 | |
icewarp | mail_server | 10.2.0 | |
icewarp | mail_server | 10.2.1 | |
icewarp | mail_server | 10.2.2 | |
icewarp | mail_server | 10.3.0 | |
icewarp | mail_server | 10.3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icewarp:mail_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "E11FB6B8-D2E7-4F76-B38C-FF90517A6EFF", "versionEndIncluding": "10.3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:9.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "22B17040-1D48-4BCC-8AB8-CE275630AB92", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:9.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "FF60A80C-6148-4234-87F7-9E5226C05293", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:9.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC90647F-D741-436E-812D-950A0A69AE28", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:9.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7603560-8C55-4A46-BE89-BB2D03F5B111", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:9.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B56EBDA-600D-4091-BF31-717DAC195EBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "E50E0941-3BDD-496A-A533-181C50C315AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DE9442E4-0468-4FAD-8470-A89BB6DEF8EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3D52315B-50BA-447A-85D2-1119CA464B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "20816B82-986E-44F1-9188-34A1827231C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "12060349-5779-435C-BDC9-4ECDA6277BA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D7BF916-C278-435C-8E8E-5F67BDC1DB48", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "99FE1579-35EC-4C6C-A63A-E3DBC0F7FD72", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A72083C1-0045-4929-B705-0610C5E0CA17", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "5316DDD8-84F0-4F1B-8A6C-FFFAF78C0686", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "75359877-B017-47A5-9ADE-9B9FDEBB3F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "64D4A427-889F-4928-B535-636A2A7D85AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "51F02A0D-378E-4150-B105-B826B6AC1553", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3C8D192-0E1A-4379-995A-B294E2FD1EB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:icewarp:mail_server:10.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E2ADA889-C52D-4C80-96EB-834489654614", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "server/webmail.php in IceWarp WebMail in IceWarp Mail Server before 10.3.3 allows remote attackers to read arbitrary files, and possibly send HTTP requests to intranet servers or cause a denial of service (CPU and memory consumption), via an XML external entity declaration in conjunction with an entity reference." }, { "lang": "es", "value": "server/webmail.php en IceWarp WebMail en el servidor de correo IceWarp anteriores a v10.3.3 permite a atacantes remotos leer ficheros arbitrarios, y posiblemente enviar peticiones HTTP a los servidores de la intranet o causar una denegaci\u00f3n de servicio (Agotamiento de CPU y de memoria), a trav\u00e9s de una entidad externa XML declaraci\u00f3n en relaci\u00f3n con una referencia de entidad." } ], "id": "CVE-2011-3579", "lastModified": "2024-11-21T01:30:47.280", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-09-30T17:55:01.180", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-09/0145.html" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/8404" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1026093" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/75721" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/49753" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70025" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2011-013.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-09/0145.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1026093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/75721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/49753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2011-013.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.