Nessus Plugin #12637
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
Open WebMail vacation.pl Arbitrary Command Execution
- Family:
- Gain a shell remotely
- Category:
- infos
- Copyright:
- This script is Copyright (C) 2004 George A. Theall
- Summary:
- Checks for Arbitrary Command Execution flaw in Open WebMail's vacation.pl
- Version:
- $Revision: 1.7 $
- Cve_id:
- -
- Bugtraq_id:
- 10637
- Xrefs:
- OSVDB:7474
- Description:
The target is running at least one instance of Open WebMail in which
the vacation.pl component fails to sufficiently validate user input.
This failure enables remote attackers to execute arbitrary programs on
a target using the privileges under which the web server operates.
For further information, see :
http://www.openwebmail.org/openwebmail/download/cert/advisories/SA-04:04.txt
If safe_checks are disabled, Nessus attempts to create the file
/tmp/nessus_openwebmail_vacation_input_validation on the target.
Solution : Upgrade to Open WebMail version 2.32 20040629 or later.
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.