VID |
210016 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Horde Ingo software, according to its version number, has a command execution vulnerability which exists in versions prior to 1.1.2. Horde Ingo H3 versions prior to 1.1.2 could allow a remote, authenticated attacker to execute arbitrary commands on the system, caused by improper filtering of mailbox destinations in the procmail filter rules. By using a folder name beginning with '|' as a mailbox destination, a remote attacker could exploit this vulnerability to execute arbitrary shell commands on the affected host.
* Note: This check solely relied on the version number of the Horde Ingo software installed on the remote web server to assess this vulnerability, so this might be a false positive.
* References: http://lists.horde.org/archives/announce/2006/000296.html http://bugs.horde.org/ticket/?id=4513 http://www.frsirt.com/english/advisories/2006/4124 http://secunia.com/advisories/22482/
* Platforms Affected: Horde Ingo version 1.1.1 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of Horde Ingo (H3 (1.1.2) or later), available from the Ingo Download Web site at http://www.horde.org/download/ingo
For Debian GNU/Linux: Upgrade to the fixed version of ingo1, as listed in Debian Security Advisory DSA-1204-1 at http://www.debian.org/security/2006/dsa-1204 |
Related URL |
CVE-2006-5449 (CVE) |
Related URL |
20637 (SecurityFocus) |
Related URL |
29805 (ISS) |
|