Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: infos

BasiliX Arbitrary File Disclosure Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for arbitrary file disclosure vulnerability in BasiliX

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP script that is prone to information
disclosure.

Description :

The remote host appears to be running a BasiliX version 1.1.0 or lower.
Such versions allow retrieval of arbitrary files that are accessible to
the web server user when sending a message since they accept a list of
attachment names from the client yet do not verify that the attachments
were in fact uploaded.

Further, since these versions do not sanitize input to the 'login.php3'
script, it's possible for a possible hacker to establish a session on the
target without otherwise having access there by authenticating against
an IMAP server of his or her choosing.

See also :

http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0113.html

Solution :

Upgrade to BasiliX version 1.1.1 or later.

Threat Level:

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.