Korean
<< Back
VID 21342
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The BasiliX Webmail installed on the Web server, according to its version number, has an Arbitrary File Disclosure Vulnerability.
BasiliX is a PHP and Internet Messaging Access Protocol (IMAP) based Web mail program that uses the MySQL database server. BasiliX Webmail versions 1.1.0 and earlier are vulnerable to an Arbitrary File Disclosure Vulnerability, caused by a failure to properly verify if an attachment is actually an uploaded file. A remote attacker could exploit this vulnerability by attaching a known file(like the /etc/passwd file) on the system to an outgoing message, which would allow the attacker to possibly send sensitive information to other users.

* Note: This check solely relied on the version number of the remote BasiliX Web mail to assess this vulnerability, so this might be a false positive.

* References:
http://securitytracker.com/alerts/2002/Jun/1004574.html
http://archives.neohapsis.com/archives/bugtraq/2002-06/0232.html

* Platforms Affected:
Murat Arslan, BasiliX Webmail 1.1.0 and earlier
Unix Any version
Linux Any version
Microsoft Windows Any version
Recommendation Upgrade to the latest version (1.1.1 or later) of BasiliX Webmail, available from the BasiliX web site at http://sourceforge.net/projects/basilix/
Related URL CVE-2002-1710 (CVE)
Related URL 5062 (SecurityFocus)
Related URL 9386 (ISS)