| VID |
21339 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The BasiliX webmail installed on the Web server, according to its version number, has a SQL Injection Vulnerability. BasiliX is a PHP and Internet Messaging Access Protocol (IMAP) based Web mail program that uses the MySQL database server. BasiliX Webmail 1.1.0 and earlier are vulnerable to a SQL Injection Vulnerability, caused by improper filtering the user-supplied input before being used within an SQL query. It could allow a remote attacker to execute SQL queries, which may result in the disclosure of sensitive information contained in the database, or the ability to modify data.
* Note: This check solely relied on the version number of the remote BasiliX Web mail to assess this vulnerability, so this might be a false positive.
* References: http://archives.neohapsis.com/archives/bugtraq/2002-06/0232.html
* Platforms Affected: Murat Arslan, BasiliX Webmail 1.1.0 and earlier Unix Any version Linux Any version Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version (1.1.1 or later) of BasiliX Webmail, available from the BasiliX web site at http://sourceforge.net/projects/basilix/ |
| Related URL |
CVE-2002-1709 (CVE) |
| Related URL |
5061 (SecurityFocus) |
| Related URL |
9385 (ISS) |
|