SquirrelMail < 1.4.8 Local File Inclusion

Medium Nessus Network Monitor Plugin ID 3639


The remote host is vulnerable to a remote 'file include' flaw.


The remote host is running Squirrelmail, a web-based email client. This version of Squirrelmail is vulnerable to a 'file include' flaw within the redirect.php script. An attacker exploiting this flaw would be able to execute local commands. This can lead to the reading, writing or deletion of critical data. To exploit this flaw, the attacker would only need to be able to send web requests to the server.


Upgrade to version 1.4.8 or higher.

See Also


Plugin Details

Severity: Medium

ID: 3639

Family: CGI

Published: 2006/06/02

Updated: 2019/03/06

Dependencies: 1442

Nessus ID: 21630

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

CVSS v3.0

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:squirrelmail:squirrelmail

Reference Information

CVE: CVE-2006-2842

BID: 18231