Korean
<< Back
VID 21392
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The IMP program has the DB File SQL Injection Vulnerability.
IMP(Internet Messaging Program) is a popular Web-based E-Mail client package written in PHP for the UNIX systems. IMP 2.2.8 and earlier are vulnerable to a SQL injection vulnerability, caused by a failure to the application to properly filter the user-supplied input which is passed to SQL queries. By sending a specially crafted URLs that include SQL commands to the 'mailbox.php3' script, a remote attacker could obtain sensitive information or add, modify, or delete information in the backend database.

* References:
http://www.securiteam.com/unixfocus/5KP0S2K8UE.html
http://securitytracker.com/alerts/2003/Jan/1005904.html
http://marc.theaimsgroup.com/?l=bugtraq&m=104204786206563&w=2

* Platforms Affected:
IMP 2.2.8 and earlier
Conectiva Linux 7.0, 8.0
Debian Linux 2.2, 3.0
SuSE Linux 7.3, 8.0, 8.1
Linux Any version
Recommendation Upgrade to the latest version of IMP (3.1 or later), available from the Horde Web site at http://www.horde.org/imp/

For Debian GNU/Linux:
Upgrade to the latest imp package as listed in the Debian Security Advisory DSA-229-2 at http://www.debian.org/security/2003/dsa-229

For SuSE Linux:
Upgrade to the latest imp package, as listed in the SuSE Security Announcement SuSE-SA:2003:008 at http://www.linuxsecurity.com/advisories/suse_advisory-2862.html

For Conectiva Linux:
Upgrade to the latest imp package, as listed in the Conectiva Linux Security Announcement CLSA-2003:690 at http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000690

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2003-0025 (CVE)
Related URL 6559 (SecurityFocus)
Related URL 11028 (ISS)