Open Webmail < 2.51 20050430 Shell Escape Arbitrary Command Execution

High Nessus Network Monitor Plugin ID 2875

Synopsis

The remote host is vulnerable to an flaw that allows attackers to execute arbitrary commands.

Description

The remote host is running Open Webmail, an open-source perl script that gives remote users a web-based interface to email. This version of Open Webmail is vulnerable to a content-parsing flaw that would allow a remote attack to run arbitrary code on the Open Webmail server. Specifically, the application fails to parse out the '|' character which can be used to append commands to system calls.

Solution

Upgrade to version 2.51 20050430 or higher.

See Also

http://www.nessus.org/u?e789a315

Plugin Details

Severity: High

ID: 2875

File Name: 2875.prm

Family: CGI

Published: 2005/05/03

Modified: 2016/01/15

Dependencies: 1442

Nessus ID: 18190

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSSv3

Base Score: 7.3

Temporal Score: 7

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:H/RL:O/RC:C

Reference Information

CVE: CVE-2005-1435, CVE-2006-3233

BID: 13472, 18598