Open Webmail < 2.51 20050430 Shell Escape Arbitrary Command Execution

High Nessus Network Monitor Plugin ID 2875


The remote host is vulnerable to an flaw that allows attackers to execute arbitrary commands.


The remote host is running Open Webmail, an open-source perl script that gives remote users a web-based interface to email. This version of Open Webmail is vulnerable to a content-parsing flaw that would allow a remote attack to run arbitrary code on the Open Webmail server. Specifically, the application fails to parse out the '|' character which can be used to append commands to system calls.


Upgrade to version 2.51 20050430 or higher.

See Also

Plugin Details

Severity: High

ID: 2875

File Name: 2875.prm

Family: CGI

Published: 2005/05/03

Modified: 2016/01/15

Dependencies: 1442

Nessus ID: 18190

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:OF/RC:C


Base Score: 7.3

Temporal Score: 7


Temporal Vector: CVSS3#E:H/RL:O/RC:C

Reference Information

CVE: CVE-2005-1435, CVE-2006-3233

BID: 13472, 18598