Vulnerabilities > CVE-2003-0990

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
exploit available
metasploit

Summary

The parseAddress code in (1) SquirrelMail 1.4.0 and (2) GPG Plugin 1.1 allows remote attackers to execute commands via shell metacharacters in the "To:" field.

Vulnerable Configurations

Part Description Count
Application
Squirrelmail
2

Exploit-Db

descriptionSquirrelMail PGP Plugin command execution (SMTP). CVE-2003-0990. Remote exploit for linux platform
idEDB-ID:16888
last seen2016-02-02
modified2010-08-25
published2010-08-25
reportermetasploit
sourcehttps://www.exploit-db.com/download/16888/
titleSquirrelMail PGP Plugin command execution SMTP

Metasploit

descriptionThis module exploits a command execution vulnerability in the PGP plugin of SquirrelMail. This flaw was found while quickly grepping the code after release of some information at http://www.wslabi.com/. Later, iDefense published an advisory .... Reading an email in SquirrelMail with the PGP plugin activated is enough to compromise the underlying server. Only "cmd/unix/generic" payloads were tested.
idMSF:EXPLOIT/UNIX/WEBAPP/SQUIRRELMAIL_PGP_PLUGIN
last seen2020-03-10
modified2017-07-24
published2007-07-14
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/squirrelmail_pgp_plugin.rb
titleSquirrelMail PGP Plugin Command Execution (SMTP)

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/82369/squirrelmail_pgp_plugin.rb.txt
idPACKETSTORM:82369
last seen2016-12-05
published2009-10-30
reporterNicob
sourcehttps://packetstormsecurity.com/files/82369/SquirrelMail-PGP-Plugin-Command-Execution.html
titleSquirrelMail PGP Plugin Command Execution