Korean
<< Back
VID 21344
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The BasiliX Webmail installed on the Web server, according to its version number, has an Arbitrary Command Execution Vulnerability.
BasiliX is a PHP and Internet Messaging Access Protocol (IMAP) based Web mail program that uses the MySQL database server. Basilix Webmail 1.0.3beta and 1.0.2beta could allow a remote attacker to execute arbitrary commands, caused by a failure of the login script('login.php3') in Basilix to sanitize user input. By submitting a specially crafted web request, which contains malicious commands for the "$username" variable, a remote attacker could execute commands on the mail server with the privileges of the web server.

* References:
http://securitytracker.com/alerts/2001/Sep/1002314.html

* Platforms Affected:
Murat Arslan, Basilix Webmail 1.0.3beta and 1.0.2beta
Unix Any version
Linux Any version
Microsoft Windows Any version
Recommendation Upgrade to the latest version (1.1.0 or later) of BasiliX Webmail, available from the BasiliX web site at http://sourceforge.net/projects/basilix/
Related URL (CVE)
Related URL 3276 (SecurityFocus)
Related URL (ISS)