Vulnerabilities > CVE-2003-0990 - Remote Command Execution vulnerability in Squirrelmail G/PGP Encryption Plugin

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
squirrelmail
exploit available
metasploit

Summary

The parseAddress code in (1) SquirrelMail 1.4.0 and (2) GPG Plugin 1.1 allows remote attackers to execute commands via shell metacharacters in the "To:" field.

Vulnerable Configurations

Part Description Count
Application
Squirrelmail
2

Exploit-Db

descriptionSquirrelMail PGP Plugin command execution (SMTP). CVE-2003-0990. Remote exploit for linux platform
idEDB-ID:16888
last seen2016-02-02
modified2010-08-25
published2010-08-25
reportermetasploit
sourcehttps://www.exploit-db.com/download/16888/
titleSquirrelMail PGP Plugin command execution SMTP

Metasploit

descriptionThis module exploits a command execution vulnerability in the PGP plugin of SquirrelMail. This flaw was found while quickly grepping the code after release of some information at http://www.wslabi.com/. Later, iDefense published an advisory .... Reading an email in SquirrelMail with the PGP plugin activated is enough to compromise the underlying server. Only "cmd/unix/generic" payloads were tested.
idMSF:EXPLOIT/UNIX/WEBAPP/SQUIRRELMAIL_PGP_PLUGIN
last seen2020-03-10
modified2017-07-24
published2007-07-14
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/squirrelmail_pgp_plugin.rb
titleSquirrelMail PGP Plugin Command Execution (SMTP)

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/82369/squirrelmail_pgp_plugin.rb.txt
idPACKETSTORM:82369
last seen2016-12-05
published2009-10-30
reporterNicob
sourcehttps://packetstormsecurity.com/files/82369/SquirrelMail-PGP-Plugin-Command-Execution.html
titleSquirrelMail PGP Plugin Command Execution