IlohaMail Multiple External Programs Arbitrary Command Execution

high Nessus Plugin ID 14635

Synopsis

The remote hsot is running a webmail application that is affected by a remote command execution vulnerability.

Description

The target is running at least one instance of IlohaMail version 0.8.6. This version may contain flaws in the spell check and GnuPG features that allow an authenticated attacker to run arbitrary commands with the privileges of the web user simply by enclosing them in backticks when spell checking or sending a message.

***** Nessus has determined the vulnerability exists on the target
***** simply by looking at the version number of IlohaMail
***** installed there.

Solution

Upgrade to IlohaMail version 0.8.7 or later or disable spell check and GPG features (see conf/conf.inc).

See Also

http://www.nessus.org/u?066bde18

Plugin Details

Severity: High

ID: 14635

File Name: ilohamail_external_progs.nasl

Version: 1.11

Type: remote

Family: CGI abuses

Published: 9/2/2004

Updated: 8/15/2022

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Vulnerability Publication Date: 3/29/2003