Korean
<< Back
VID 21306
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Open WebMail program, according to its version number, has a Remote Command Execution Vulnerability via a 'userstat.pl' script.
Open WebMail is an open-source Web mail program written in Perl for Unix-based operating systems. The versions 2.30 and earlier of Open WebMail could allow a remote attacker to execute arbitrary commands on a target host, caused by insufficient filtering of shell metacharacters in parameters that are passed to the 'userstat.pl' component. By supplying shell metacharacters in parameters, a remote attacker could execute arbitrary commands in the context of the web server on the target system remotely.

* Note: This check solely relied on the version number of the remote Open WebMail to assess this vulnerability, so this might be a false positive. If the version number was obtained from the file 'openwebmail.pl' and you applied the patch that released on January 27, 2004 and later, please ignore this alert.

* References:
http://secunia.com/advisories/11091/

* Platforms Affected:
Open WebMail 2.30(2004-01-17) and earlier
Linux Any version
Recommendation Upgrade to the latest current version (dated 16-June-2004 or later) of Open WebMail from the Open WebMail Web site at http://openwebmail.org . This issue is fixed in the Open WebMail 2.30 on the 2004-01-27.
Related URL (CVE)
Related URL 10316 (SecurityFocus)
Related URL 15444 (ISS)