| VID |
21344 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The BasiliX Webmail installed on the Web server, according to its version number, has an Arbitrary Command Execution Vulnerability. BasiliX is a PHP and Internet Messaging Access Protocol (IMAP) based Web mail program that uses the MySQL database server. Basilix Webmail 1.0.3beta and 1.0.2beta could allow a remote attacker to execute arbitrary commands, caused by a failure of the login script('login.php3') in Basilix to sanitize user input. By submitting a specially crafted web request, which contains malicious commands for the "$username" variable, a remote attacker could execute commands on the mail server with the privileges of the web server.
* References: http://securitytracker.com/alerts/2001/Sep/1002314.html
* Platforms Affected: Murat Arslan, Basilix Webmail 1.0.3beta and 1.0.2beta Unix Any version Linux Any version Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version (1.1.0 or later) of BasiliX Webmail, available from the BasiliX web site at http://sourceforge.net/projects/basilix/ |
| Related URL |
(CVE) |
| Related URL |
3276 (SecurityFocus) |
| Related URL |
(ISS) |
|