Vulnerabilities > CVE-2001-0021 - Unspecified vulnerability in Endymion Mailman Webmail
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
MailMan Webmail 3.0.25 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the alternate_template parameter.
Vulnerable Configurations
Exploit-Db
description | Endymion MailMan 3.0..x Remote Arbitrary Command Execution Vulnerability. CVE-2001-0021. Remote exploit for unix platform |
id | EDB-ID:20469 |
last seen | 2016-02-02 |
modified | 2000-12-06 |
published | 2000-12-06 |
reporter | Secure Reality Advisories |
source | https://www.exploit-db.com/download/20469/ |
title | Endymion MailMan 3.0.x - Remote Arbitrary Command Execution Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | MAILMAN_WEBMAIL.NASL |
description | The version of MailMan Webmail on the remote web server has an arbitrary command execution vulnerability. Input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10566 |
published | 2000-12-06 |
reporter | This script is Copyright (C) 2000-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10566 |
title | MailMan Webmail mmstdod.cgi Arbitrary Command Execution |
References
- http://archives.neohapsis.com/archives/bugtraq/2000-12/0057.html
- http://archives.neohapsis.com/archives/bugtraq/2000-12/0057.html
- http://www.endymion.com/products/mailman/history.htm
- http://www.endymion.com/products/mailman/history.htm
- http://www.securityfocus.com/bid/2063
- http://www.securityfocus.com/bid/2063
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5649
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5649