Vulnerability Name: | CVE-2002-1385 (CCN-10904) | ||||||||
Assigned: | 2002-12-18 | ||||||||
Published: | 2002-12-18 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | openwebmail_init in Open WebMail 1.81 and earlier allows local users to execute arbitrary code via .. (dot dot) sequences in a login name, such as the name provided in the sessionid parameter for openwebmail-abook.pl, which is used to find a configuration file that specifies additional code to be executed. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Wed Dec 18 2002 - 11:37:59 CST Openwebmail 1.71 remote root compromise Source: MITRE Type: CNA CVE-2002-1385 Source: BUGTRAQ Type: UNKNOWN 20021218 Openwebmail 1.71 remote root compromise Source: BUGTRAQ Type: UNKNOWN 20021219 [Fix] Openwebmail 1.71 remote root compromise Source: CCN Type: BugTraq Mailing List, 2002-12-19 16:55:06 [Fix] Openwebmail 1.71 remote root compromise Source: CCN Type: Open WebMail Web site Index of /openwebmail/download Source: CONFIRM Type: Patch, Vendor Advisory http://sourceforge.net/forum/forum.php?thread_id=782605&forum_id=108435 Source: CCN Type: Open WebMail Security Advisory 20021219 Remote user can execute arbitary command with root Source: CCN Type: OSVDB ID: 6654 Open WebMail openwebmail-abook.pl Session Parameter Arbitrary Code Execution Source: CCN Type: OSVDB ID: 7100 Open WebMail openwebmail-shared.pl Session Parameter Arbitrary Code Execution Source: BID Type: UNKNOWN 6425 Source: CCN Type: BID-6425 Open WebMail Arbitrary Script Execution Vulnerability Source: XF Type: UNKNOWN open-webmail-command-execution(10904) Source: XF Type: UNKNOWN open-webmail-command-execution(10904) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |