Korean
<< Back
VID 210016
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Horde Ingo software, according to its version number, has a command execution vulnerability which exists in versions prior to 1.1.2. Horde Ingo H3 versions prior to 1.1.2 could allow a remote, authenticated attacker to execute arbitrary commands on the system, caused by improper filtering of mailbox destinations in the procmail filter rules. By using a folder name beginning with '|' as a mailbox destination, a remote attacker could exploit this vulnerability to execute arbitrary shell commands on the affected host.

* Note: This check solely relied on the version number of the Horde Ingo software installed on the remote web server to assess this vulnerability, so this might be a false positive.

* References:
http://lists.horde.org/archives/announce/2006/000296.html
http://bugs.horde.org/ticket/?id=4513
http://www.frsirt.com/english/advisories/2006/4124
http://secunia.com/advisories/22482/

* Platforms Affected:
Horde Ingo version 1.1.1 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of Horde Ingo (H3 (1.1.2) or later), available from the Ingo Download Web site at http://www.horde.org/download/ingo

For Debian GNU/Linux:
Upgrade to the fixed version of ingo1, as listed in Debian Security Advisory DSA-1204-1 at http://www.debian.org/security/2006/dsa-1204
Related URL CVE-2006-5449 (CVE)
Related URL 20637 (SecurityFocus)
Related URL 29805 (ISS)