Nessus Plugin #15529
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
Open WebMail userstat.pl Arbitrary Command Execution
- Family:
- Gain a shell remotely
- Category:
- attack
- Copyright:
- This script is Copyright (C) 2004 George A. Theall
- Summary:
- Checks for Arbitrary Command Execution flaw in Open WebMail's userstat.pl
- Version:
- $Revision: 1.1 $
- Cve_id:
- -
- Bugtraq_id:
- 10316
- Xrefs:
- OSVDB:4201
- Description:
The target is running at least one instance of Open WebMail in which
the userstat.pl component fails to sufficiently validate user input.
This failure enables remote attackers to execute arbitrary programs on
the target using the privileges under which the web server operates.
For further information, see :
http://www.openwebmail.org/openwebmail/download/cert/advisories/SA-04:01.txt
Solution : Upgrade to Open WebMail version 2.30 20040127 or later.
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.