Open WebMail Shell Escape Arbitrary Command Execution

medium Nessus Plugin ID 18190

Synopsis

The remote web server contains a Perl application that allows execution of arbitrary code.

Description

According to its banner, the version of Open WebMail installed on the remote host may allow execution of arbitrary shell commands due to its failure to ensure shell escape characters are removed from filenames and other strings before trying to read from them.

Solution

Upgrade to Open WebMail 2.5.1-20050430 or later.

See Also

http://www.nessus.org/u?e789a315

Plugin Details

Severity: Medium

ID: 18190

File Name: openwebmail_perl_open.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 5/4/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 5/2/2005

Reference Information

CVE: CVE-2005-1435

BID: 13472