Korean
<< Back
VID 21364
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The IlohaMail Webmail software is vulnerable to a directory traversal flaw via the 'session' variable. IlohaMail is a webmail package written in PHP. IlohaMail version 0.7.11 and earlier contain a flaw that allows a remote attacker to access files outside of the web root directory. The issue is due to the index.php script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the session variable. To exploit this vulnerability, a remote attacker will send a "index.php" request containing "dot dot" sequences (/../) and a known file appended with a NULL byte character (%00).

* References:
http://www.osvdb.org/displayvuln.php?osvdb_id=7335
http://dev.ilohamail.org/IlohaMail.log.txt

* Platforms Affected:
IlohaMail version 0.7.11 and earlier
Any operating system Any version
Recommendation Upgrade to the latest version of IlohaMail (0.7.12 or later), available from the IlohaMail Download site at http://sourceforge.net/projects/ilohamail/
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)