Vulnerabilities > CVE-2005-0152 - Unspecified vulnerability in Squirrelmail 1.2.6
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN squirrelmail
nessus
Summary
PHP remote file inclusion vulnerability in Squirrelmail 1.2.6 allows remote attackers to execute arbitrary code via "URL manipulation."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-662.NASL |
description | Andrew Archibald discovered that the last update to squirrelmail which was intended to fix several problems caused a regression which got exposed when the user hits a session timeout. For completeness below is the original advisory text : Several vulnerabilities have been discovered in Squirrelmail, a commonly used webmail system. The Common Vulnerabilities and Exposures project identifies the following problems : - CAN-2005-0104 Upstream developers noticed that an unsanitised variable could lead to cross site scripting. - CAN-2005-0152 Grant Hollingworth discovered that under certain circumstances URL manipulation could lead to the execution of arbitrary code with the privileges of www-data. This problem only exists in version 1.2.6 of Squirrelmail. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 16283 |
published | 2005-02-02 |
reporter | This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/16283 |
title | Debian DSA-662-2 : squirrelmail - several vulnerabilities |
code |
|
References
- http://ftp.debian.org/debian/dists/stable-proposed-updates/squirrelmail_1.2.6-2_i386.changes
- http://ftp.debian.org/debian/dists/stable-proposed-updates/squirrelmail_1.2.6-2_i386.changes
- http://secunia.com/advisories/14096
- http://secunia.com/advisories/14096
- http://www.debian.org/security/2005/dsa-662
- http://www.debian.org/security/2005/dsa-662
- http://www.kb.cert.org/vuls/id/203214
- http://www.kb.cert.org/vuls/id/203214