Korean
<< Back
VID 21840
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The NeoMail program is vulnerable to a security bypass vulnerability in the neomail-prefs.pl script. NeoMail is an open-source webmail application written in Perl. NeoMail version 1.28 and earlier versions could allow a remote attacker to bypass security restrictions, caused by improper validation of the 'sessionid' parameter in the 'neomail-prefs.pl' script, when configured with homedirfolders and homedirspools disabled. A remote attacker could exploit this vulnerability to create or delete arbitrary mail-folder files in arbitrary directories writable by the mail group. Successful exploitation requires that NeoMail is configured with $homedirfolders = 'no' and $homedirspools = 'no'.

* References:
http://secunia.com/secunia_research/2006-3/advisory/
http://sourceforge.net/project/shownotes.php?release_id=392562&group_id=2874
http://secunia.com/advisories/18785/
http://www.frsirt.com/english/advisories/2006/0564

* Platforms Affected:
NeoCode Solutions, Inc., NeoMail version 1.28 and earlier versions
Unix Any version
Linux Any version
Recommendation Upgrade to the latest version of NeoMail (1.29 or later), available from the NeoMail Web site at http://neocodesolutions.com/software/neomail/
Related URL CVE-2006-0711 (CVE)
Related URL 16651 (SecurityFocus)
Related URL 24737 (ISS)