|
Family: Gain a shell remotely --> Category: infos
Open WebMail Arbitrary Code Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for arbitrary execution vulnerability in Open WebMail
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a Perl application that allows
execution of arbitrary code.
Description :
According to its banner, the version of Open WebMail installed on the
remote host may allow execution of arbitrary shell commands due to its
failure to ensure shell escape characters are removed from filenames
and other strings before trying to read from them.
See also :
http://www.nessus.org/u?e789a315
Solution :
Upgrade to Open WebMail 2.5.1-20050430 or later.
Threat Level:
Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:R/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|