Vulnerability Note VU#502328
SquirrelMail vulnerable to command injection because of flawed input checking in S/MIME plug-in
SquirrelMail contains a flaw in its S/MIME plug-in certificate handling routines which may allow arbitrary code to be remotely executed.
From the SquirrelMail web page:
SquirrelMail's input handling contains a flaw that may allow remote attackers to execute arbitrary code with elevated privileges. The S/MIME plug-in fails to check the $cert variable, which contains user-supplied data, before using the variable in a call to exec().
A remote attacker may be able to supply arbitrary code to be executed in the call to exec() with the privileges of the web server.
Apply an update
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|SquirrelMail Project Team||Affected||08 Feb 2005||09 Feb 2005|
CVSS Metrics (Learn More)
Thanks to iDefense for reporting this vulnerability, who in turn credit Karol Wiesek with the discovery of the flaw.
This document was written by Ken MacInnis based primarily on information from iDefense Inc.
- CVE IDs: CAN-2005-0239
- Date Public: 07 Feb 2005
- Date First Published: 09 Feb 2005
- Date Last Updated: 10 Feb 2005
- Severity Metric: 4.91
- Document Revision: 14
If you have feedback, comments, or additional information about this vulnerability, please send us email.