Korean
<< Back
VID 21736
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The JamMail program is vulnerable to a command execution vulnerability in the jammail.pl script. JamMail is a web mail script written in perl. JamMail version 1.8 could allow a remote attacker to execute arbitrary system commands, caused by improper validation of user-supplied input passed to the mail parameter of the jammail.pl script. A remote attacker could inject shell meta-characters ('I' or ';') to execute arbitrary shell commands on the system with privileges of the Web server process.

* References:
http://www.securitytracker.com/alerts/2005/Jun/1014175.html

* Platforms Affected:
JamMail version 1.8
Linux Any version
Unix Any version
Recommendation No upgrade or patch available as of June 2014. Please use another product.
Related URL CVE-2005-1959 (CVE)
Related URL 13937 (SecurityFocus)
Related URL 20986 (ISS)