Open WebMail userstat.pl Arbitrary Command Execution

high Nessus Plugin ID 15529

Synopsis

Arbitrary commands may be run on the remote host.

Description

The target is running at least one instance of Open WebMail in which the userstat.pl component fails to sufficiently validate user input. This failure enables remote attackers to execute arbitrary programs on the target using the privileges under which the web server operates. For further information, see :

http://www.openwebmail.org/openwebmail/download/cert/advisories/SA-04:01.txt

Solution

Upgrade to Open WebMail version 2.30 20040127 or later.

Plugin Details

Severity: High

ID: 15529

File Name: openwebmail_userstat_command_execution.nasl

Version: 1.14

Type: remote

Family: CGI abuses

Published: 10/21/2004

Updated: 8/15/2022

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 1/27/2004

Reference Information

BID: 10316