SquirrelMail < 1.4.8 Local File Inclusion

medium Nessus Network Monitor Plugin ID 3639

Synopsis

The remote host is vulnerable to a remote 'file include' flaw.

Description

The remote host is running Squirrelmail, a web-based email client. This version of Squirrelmail is vulnerable to a 'file include' flaw within the redirect.php script. An attacker exploiting this flaw would be able to execute local commands. This can lead to the reading, writing or deletion of critical data. To exploit this flaw, the attacker would only need to be able to send web requests to the server.

Solution

Upgrade to version 1.4.8 or higher.

See Also

http://www.squirrelmail.org

Plugin Details

Severity: Medium

ID: 3639

Family: CGI

Published: 6/2/2006

Updated: 3/6/2019

Nessus ID: 21630

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:squirrelmail:squirrelmail

Reference Information

CVE: CVE-2006-2842

BID: 18231