| VID |
22095 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
An input validation error exists in SquirrelMail on the web server that could allow remote users to cause arbitrary files to be included and loaded by the PHP interpreter at runtime. SquirrelMail is an easy to use, good looking and functional web mail system written in PHP. SquirrelMail makes insecure calls to the PHP function include(). The SquirrelMail versions up to and including 1.0.4 allows an attacker to execute arbitrary commands on the remote web server, or to read the configuration files of the installation thereby gaining database credentials with the permissions of the web server user.
* References: http://www.securityfocus.com/bid/2968 http://www.squirrelmail.org |
| Recommendation |
Upgrade to the latest version. You can download a version above 1.0.5 from: http://www.squirrelmail.org http://prdownloads.sourceforge.net/squirrelmail/squirrelmail-1.0.5.tar.gz |
| Related URL |
CVE-2001-1159 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|