| VID |
21912 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The SquirrelMail program is vulnerable to a local file include vulnerability via the 'plugins' parameter. SquirrelMail is a Web mail system written in PHP4. SquirrelMail version 1.4.6 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'plugins[]' parameter of the 'functions/plugin.php' script. If 'register_globals' setting is enabled, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.
* References: http://www.squirrelmail.org/security/issue/2006-06-01 http://www.securityfocus.com/archive/1/435605/30/0/threaded http://www.frsirt.com/english/advisories/2006/2101 http://secunia.com/advisories/20406 http://securitytracker.com/id?1016209
* Platforms Affected: SquirrelMail Project Team, SquirrelMail version 1.4.6 and earlier versions Any operating system Any version |
| Recommendation |
Apply the patch for this vulnerability, available from the SquirrelMail Web site at http://www.squirrelmail.org/security/issue/2006-06-01
As a workaround, disable PHP's 'register_globals' setting. |
| Related URL |
CVE-2006-2842 (CVE) |
| Related URL |
18231 (SecurityFocus) |
| Related URL |
27019 (ISS) |
|