Vulnerabilities > CVE-2005-1924 - Unspecified vulnerability in Squirrelmail GPG Plugin
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The G/PGP (GPG) Plugin 2.1 and earlier for Squirrelmail allow remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the fpr parameter to the deleteKey function in gpg_keyring.php, as called by (a) import_key_file.php, (b) import_key_text.php, and (c) keyring_main.php; and (2) the keyserver parameter to the gpg_recv_key function in gpg_key_functions.php, as called by gpg_options.php. NOTE: this issue may overlap CVE-2007-3636.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description SquirrelMail G/PGP Plugin deletekey() Command Injection Exploit. CVE-2005-1924. Webapps exploit for php platform id EDB-ID:4718 last seen 2016-01-31 modified 2007-12-11 published 2007-12-11 reporter Backdoored source https://www.exploit-db.com/download/4718/ title SquirrelMail G/PGP Plugin deletekey Command Injection Exploit description SquirrelMail G/PGP Encryption Plug-in 2.0 Command Execution Vuln. CVE-2005-1924. Webapps exploit for php platform file exploits/php/webapps/4173.txt id EDB-ID:4173 last seen 2016-01-31 modified 2007-07-11 platform php port published 2007-07-11 reporter jmp-esp source https://www.exploit-db.com/download/4173/ title SquirrelMail G/PGP Encryption Plugin 2.0 - Command Execution Vuln type webapps
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200708-08.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200708-08 (SquirrelMail G/PGP plugin: Arbitrary code execution) The functions deletekey(), gpg_check_sign_pgp_mime() and gpg_recv_key() used in the SquirrelMail G/PGP encryption plugin do not properly escape user-supplied data. Impact : An authenticated user could use the plugin to execute arbitrary code on the server, or a remote attacker could send a specially crafted e-mail to a SquirrelMail user, possibly leading to the execution of arbitrary code with the privileges of the user running the underlying web server. Note that the G/PGP plugin is disabled by default. Workaround : Enter the SquirrelMail configuration directory (/usr/share/webapps/squirrelmail/version/htdocs/config), then execute the conf.pl script. Select the plugins menu, then select the gpg plugin item number in the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25873 |
published | 2007-08-13 |
reporter | This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25873 |
title | GLSA-200708-08 : SquirrelMail G/PGP plugin: Arbitrary code execution |
code |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 24874,24782 CVE(CAN) ID: CVE-2005-1924,CVE-2006-4169 SquirrelMail是一个多功能的用PHP4实现的Webmail程序,可运行于Linux/Unix类操作系统下。 SquirrelMail的实现上存在多个输入验证漏洞,远程攻击者可能利用这些漏洞在服务器上执行任意命令。 SquirrelMail中的G/PGP加密插件没有正确地过滤所包含的某些文件,gpg_help.php和gpg_help_base.php文件中可能包含有通过“help” HTTP GET请求参数所提供的本地文件,代码如下: 68 // Help body text is inserted here via GET parameter 69 require_once (SM_PATH.'plugins/gpg/help/' . $_GET['help'] ); 如果使用了目录遍历标识符,攻击者就可以导致将储存在Web服务器中的文件解析为PHP代码。 由于使用未经过滤的用户数据调用了exec(),导致G/PGP加密插件中gpg_key_functions.php所定义的gpg_recv_key()函数中存在命令注入漏洞,代码如下: $command = "$path_to_gpg --batch --no-tty --homedir $gpg_key_dir \ --keyserver hkp://$keyserver --recv-key $searchkeyid 2>&1"; [...] exec($command, $output, $returnval); 上面的$keyserver变量是通过对gpg_options.php脚本的POST数据提供的。攻击者必须拥有有效的认证会话才能利用这个漏洞。 由于使用未经过滤的用户数据调用了exec(),导致G/PGP加密插件中gpg_hook_functions.php所定义的gpg_check_sign_pgp_mime()函数中存在命令注入漏洞,代码如下: $command = "echo -n \"$messageSignedText\" | $path_to_gpg --batch \ --no-tty --homedir $gpg_key_dir --verify ".\ $detachedSignatureFilename."- 2>&1"; if ($debug) echo "gpg command: ".$command."\"; exec($command, $results, $returnval); $messageSignedText变量中包含有从邮件消息中剥离的数据。 由于使用未经过滤的用户数据调用了exec(),导致G/PGP加密插件中gpg_keyring.php所定义的deleteKey()函数中存在命令注入漏洞,代码如下: $command = "$path_to_gpg --batch --no-tty --yes --homedir \ $gpg_key_dir $flag $fpr 2>&1"; exec($command, $output, $returnval); deleteKey()例程是从import_key_file.php、import_key_text.php和keyring_main.php文件中调用的,且$fpr变量是在POST数据中提供的。攻击者必须拥有有效的认证会话才能利用这个漏洞。 SquirrelMail G/PGP加密插件 2.1 SquirrelMail G/PGP加密插件 2.0 临时解决方法: * 禁用G/PGP插件,或在调用exec()之前添加以下行: $messageSignedText= escapeshellarg($messageSignedText); $keyserver = escapeshellarg($keyserver); $fpr = escapeshellarg($fpr); 厂商补丁: SquirrelMail ------------ 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本: <a href="http://www.squirrelmail.org" target="_blank">http://www.squirrelmail.org</a> |
id | SSV:2012 |
last seen | 2017-11-19 |
modified | 2007-07-18 |
published | 2007-07-18 |
reporter | Root |
title | SquirrelMail G/PGP加密插件多个远程命令执行漏洞 |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=329
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=331
- http://www.attrition.org/pipermail/vim/2007-July/001710.html
- http://www.securityfocus.com/bid/24874
- http://secunia.com/advisories/26035
- http://security.gentoo.org/glsa/glsa-200708-08.xml
- http://secunia.com/advisories/26424
- http://www.vupen.com/english/advisories/2007/2513
- http://osvdb.org/37924
- http://osvdb.org/37923
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35364
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35355
- https://www.exploit-db.com/exploits/4173
- http://www.securityfocus.com/archive/1/473370/100/0/threaded