Korean
<< Back
VID 21912
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The SquirrelMail program is vulnerable to a local file include vulnerability via the 'plugins' parameter. SquirrelMail is a Web mail system written in PHP4. SquirrelMail version 1.4.6 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'plugins[]' parameter of the 'functions/plugin.php' script. If 'register_globals' setting is enabled, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.

* References:
http://www.squirrelmail.org/security/issue/2006-06-01
http://www.securityfocus.com/archive/1/435605/30/0/threaded
http://www.frsirt.com/english/advisories/2006/2101
http://secunia.com/advisories/20406
http://securitytracker.com/id?1016209

* Platforms Affected:
SquirrelMail Project Team, SquirrelMail version 1.4.6 and earlier versions
Any operating system Any version
Recommendation Apply the patch for this vulnerability, available from the SquirrelMail Web site at http://www.squirrelmail.org/security/issue/2006-06-01

As a workaround, disable PHP's 'register_globals' setting.
Related URL CVE-2006-2842 (CVE)
Related URL 18231 (SecurityFocus)
Related URL 27019 (ISS)