Vulnerabilities > CVE-2006-0757 - Unspecified vulnerability in Hivemail

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
hivemail
exploit available

Summary

Multiple eval injection vulnerabilities in HiveMail 1.3 and earlier allow remote attackers to execute arbitrary PHP code via (1) the contactgroupid parameter in addressbook.update.php, (2) the messageid parameter in addressbook.add.php, (3) the folderid parameter in folders.update.php, and possibly certain parameters in (4) calendar.event.php, (5) index.php, (6) pop.download.php, (7) read.bounce.php, (8) rules.block.php, (9) language.php, and (10) certain other scripts, as demonstrated by an addressbook.update.php request with a contactgroupid value of phpinfo() preceded by facilitators.

Exploit-Db

  • descriptionHiveMail 1.2.2/1.3 folders.update.php folderid Variable Arbitrary PHP Command Execution. CVE-2006-0757. Webapps exploit for php platform
    idEDB-ID:27185
    last seen2016-02-03
    modified2006-02-11
    published2006-02-11
    reporterGulfTech Security
    sourcehttps://www.exploit-db.com/download/27185/
    titleHiveMail 1.2.2/1.3 folders.update.php folderid Variable Arbitrary PHP Command Execution
  • descriptionHiveMail 1.2.2/1.3 addressbook.update.php contactgroupid Variable Arbitrary PHP Command Execution. CVE-2006-0757 . Webapps exploit for php platform
    idEDB-ID:27184
    last seen2016-02-03
    modified2006-02-11
    published2006-02-11
    reporterGulfTech Security
    sourcehttps://www.exploit-db.com/download/27184/
    titleHiveMail 1.2.2/1.3 addressbook.update.php contactgroupid Variable Arbitrary PHP Command Execution
  • descriptionHiveMail <= 1.3 (addressbook.add.php) Remote Code Execution Exploit. CVE-2006-0757,CVE-2006-0759. Webapps exploit for php platform
    idEDB-ID:1756
    last seen2016-01-31
    modified2006-05-06
    published2006-05-06
    reporter[Oo]
    sourcehttps://www.exploit-db.com/download/1756/
    titleHiveMail <= 1.3 addressbook.add.php Remote Code Execution Exploit