VID |
21736 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The JamMail program is vulnerable to a command execution vulnerability in the jammail.pl script. JamMail is a web mail script written in perl. JamMail version 1.8 could allow a remote attacker to execute arbitrary system commands, caused by improper validation of user-supplied input passed to the mail parameter of the jammail.pl script. A remote attacker could inject shell meta-characters ('I' or ';') to execute arbitrary shell commands on the system with privileges of the Web server process.
* References: http://www.securitytracker.com/alerts/2005/Jun/1014175.html
* Platforms Affected: JamMail version 1.8 Linux Any version Unix Any version |
Recommendation |
No upgrade or patch available as of June 2014. Please use another product. |
Related URL |
CVE-2005-1959 (CVE) |
Related URL |
13937 (SecurityFocus) |
Related URL |
20986 (ISS) |
|