Family: Gain a shell remotely --> Category: infos
Open WebMail vacation.pl Arbitrary Command Execution Vulnerability Scan
Vulnerability Scan Summary
Checks for Arbitrary Command Execution flaw in Open WebMail's vacation.pl
Detailed Explanation for this Vulnerability Test
The target is running at least one instance of Open WebMail in which
the vacation.pl component fails to sufficiently validate user input.
This failure enables remote attackers to execute arbitrary programs on
a target using the rights under which the web server operates.
For further information, see :
If safe_checks are disabled, Nessus attempts to create the file
/tmp/nessus_openwebmail_vacation_input_validation on the target.
Solution : Upgrade to Open WebMail version 2.32 20040629 or later.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.