Korean
<< Back
VID 21574
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Open WebMail, according to its version number, has a remote shell command execution vulnerability. Open WebMail is an open-source Web mail system based on the Neomail version 1.14 from Ernie Miller, written in Perl for Unix-based operating systems. Open WebMail versions prior to 2.51-20050430 could allow a remote attacker to execute arbitrary shell commands, caused by improper validation of certain user-supplied parameters passed to a Perl open() function call. A remote authenticated attacker could send specially crafted parameter values to execute operating system commands on the affected system.

* Note: This check solely relied on the version number of the Open WebMail installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.securitytracker.com/alerts/2005/May/1013859.html

* Platforms Affected:
Open WebMail Project, Open WebMail versions prior 2.51-20050430
Linux Any version
Unix Any version
Recommendation This issue has been addressed in releases of Open WebMail dated after Apr 30, 2005. Upgrade to the latest version of Open WebMail (2.51-20050430 or later), available from the Open WebMail Download Web page at http://openwebmail.org/openwebmail/download/
Related URL CVE-2005-1435 (CVE)
Related URL 13472 (SecurityFocus)
Related URL 20356 (ISS)