SquirrelMail S/MIME Plug-in Remote Command Execution

medium Nessus Plugin ID 17257

Synopsis

The remote web server contains a PHP script that is prone to arbitrary command execution attacks.

Description

The S/MIME plugin for SquirrelMail installed on the remote host does not sanitize the 'cert' parameter used by the 'viewcert.php' script. An authenticated user can exploit this flaw to execute system commands remotely in the context of the web server.

Solution

Upgrade to version 0.6 or later of the plugin.

See Also

http://www.nessus.org/u?ce80e4bd

http://www.squirrelmail.org/plugin_view.php?id=54

Plugin Details

Severity: Medium

ID: 17257

File Name: squirrelmail_smime_cmd_execution.nasl

Version: 1.24

Type: remote

Family: CGI abuses

Published: 3/3/2005

Updated: 4/7/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:squirrelmail:squirrelmail

Required KB Items: www/PHP, imap/login, imap/password

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 2/6/2005

Vulnerability Publication Date: 2/7/2005

Reference Information

CVE: CVE-2005-0239

BID: 12467