Family: CGI abuses --> Category: infos
IlohaMail External Programs Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary
Checks for External Programs vulnerabilities in IlohaMail
Detailed Explanation for this Vulnerability Test
The target is running at least one instance of IlohaMail version
0.8.6. This version may contain flaws in the spell check and GnuPG
features that allow an authenticated attacker to run arbitrary
commands with the rights of the web user simply by enclosing them
in backticks when spell checking or sending a message.
***** Nessus has acertaind the vulnerability exists on the target
***** simply by looking at the version number of IlohaMail
***** installed there.
Solution : Upgrade to IlohaMail version 0.8.7 or later or disable
spell check and GPG features (see conf/conf.inc).
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.