Vulnerabilities > CVE-2006-4169 - Unspecified vulnerability in Squirrelmail GPG Plugin 2.0/2.1Dev
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN squirrelmail
nessus
Summary
Multiple directory traversal vulnerabilities in the G/PGP (GPG) Plugin 2.0, and 2.1dev before 20070614, for Squirrelmail allow remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the help parameter to (1) gpg_help.php or (2) gpg_help_base.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200708-08.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200708-08 (SquirrelMail G/PGP plugin: Arbitrary code execution) The functions deletekey(), gpg_check_sign_pgp_mime() and gpg_recv_key() used in the SquirrelMail G/PGP encryption plugin do not properly escape user-supplied data. Impact : An authenticated user could use the plugin to execute arbitrary code on the server, or a remote attacker could send a specially crafted e-mail to a SquirrelMail user, possibly leading to the execution of arbitrary code with the privileges of the user running the underlying web server. Note that the G/PGP plugin is disabled by default. Workaround : Enter the SquirrelMail configuration directory (/usr/share/webapps/squirrelmail/version/htdocs/config), then execute the conf.pl script. Select the plugins menu, then select the gpg plugin item number in the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25873 |
published | 2007-08-13 |
reporter | This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25873 |
title | GLSA-200708-08 : SquirrelMail G/PGP plugin: Arbitrary code execution |
code |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 24874,24782 CVE(CAN) ID: CVE-2005-1924,CVE-2006-4169 SquirrelMail是一个多功能的用PHP4实现的Webmail程序,可运行于Linux/Unix类操作系统下。 SquirrelMail的实现上存在多个输入验证漏洞,远程攻击者可能利用这些漏洞在服务器上执行任意命令。 SquirrelMail中的G/PGP加密插件没有正确地过滤所包含的某些文件,gpg_help.php和gpg_help_base.php文件中可能包含有通过“help” HTTP GET请求参数所提供的本地文件,代码如下: 68 // Help body text is inserted here via GET parameter 69 require_once (SM_PATH.'plugins/gpg/help/' . $_GET['help'] ); 如果使用了目录遍历标识符,攻击者就可以导致将储存在Web服务器中的文件解析为PHP代码。 由于使用未经过滤的用户数据调用了exec(),导致G/PGP加密插件中gpg_key_functions.php所定义的gpg_recv_key()函数中存在命令注入漏洞,代码如下: $command = "$path_to_gpg --batch --no-tty --homedir $gpg_key_dir \ --keyserver hkp://$keyserver --recv-key $searchkeyid 2>&1"; [...] exec($command, $output, $returnval); 上面的$keyserver变量是通过对gpg_options.php脚本的POST数据提供的。攻击者必须拥有有效的认证会话才能利用这个漏洞。 由于使用未经过滤的用户数据调用了exec(),导致G/PGP加密插件中gpg_hook_functions.php所定义的gpg_check_sign_pgp_mime()函数中存在命令注入漏洞,代码如下: $command = "echo -n \"$messageSignedText\" | $path_to_gpg --batch \ --no-tty --homedir $gpg_key_dir --verify ".\ $detachedSignatureFilename."- 2>&1"; if ($debug) echo "gpg command: ".$command."\"; exec($command, $results, $returnval); $messageSignedText变量中包含有从邮件消息中剥离的数据。 由于使用未经过滤的用户数据调用了exec(),导致G/PGP加密插件中gpg_keyring.php所定义的deleteKey()函数中存在命令注入漏洞,代码如下: $command = "$path_to_gpg --batch --no-tty --yes --homedir \ $gpg_key_dir $flag $fpr 2>&1"; exec($command, $output, $returnval); deleteKey()例程是从import_key_file.php、import_key_text.php和keyring_main.php文件中调用的,且$fpr变量是在POST数据中提供的。攻击者必须拥有有效的认证会话才能利用这个漏洞。 SquirrelMail G/PGP加密插件 2.1 SquirrelMail G/PGP加密插件 2.0 临时解决方法: * 禁用G/PGP插件,或在调用exec()之前添加以下行: $messageSignedText= escapeshellarg($messageSignedText); $keyserver = escapeshellarg($keyserver); $fpr = escapeshellarg($fpr); 厂商补丁: SquirrelMail ------------ 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本: <a href="http://www.squirrelmail.org" target="_blank">http://www.squirrelmail.org</a> |
id | SSV:2012 |
last seen | 2017-11-19 |
modified | 2007-07-18 |
published | 2007-07-18 |
reporter | Root |
title | SquirrelMail G/PGP加密插件多个远程命令执行漏洞 |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=555
- http://www.securityfocus.com/bid/24874
- http://secunia.com/advisories/26035
- http://security.gentoo.org/glsa/glsa-200708-08.xml
- http://secunia.com/advisories/26424
- http://www.vupen.com/english/advisories/2007/2513
- http://osvdb.org/37932
- http://osvdb.org/37933
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35362