| VID |
21364 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The IlohaMail Webmail software is vulnerable to a directory traversal flaw via the 'session' variable. IlohaMail is a webmail package written in PHP. IlohaMail version 0.7.11 and earlier contain a flaw that allows a remote attacker to access files outside of the web root directory. The issue is due to the index.php script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the session variable. To exploit this vulnerability, a remote attacker will send a "index.php" request containing "dot dot" sequences (/../) and a known file appended with a NULL byte character (%00).
* References: http://www.osvdb.org/displayvuln.php?osvdb_id=7335 http://dev.ilohamail.org/IlohaMail.log.txt
* Platforms Affected: IlohaMail version 0.7.11 and earlier Any operating system Any version |
| Recommendation |
Upgrade to the latest version of IlohaMail (0.7.12 or later), available from the IlohaMail Download site at http://sourceforge.net/projects/ilohamail/ |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|