Vulnerability Name:

CVE-2006-4169 (CCN-35362)

Assigned:2006-08-16
Published:2007-07-11
Updated:2017-07-20
Summary:Multiple directory traversal vulnerabilities in the G/PGP (GPG) Plugin 2.0, and 2.1dev before 20070614, for Squirrelmail allow remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the help parameter to (1) gpg_help.php or (2) gpg_help_base.php.
The vendor has addressed this issue in the following product update: http://www.squirrelmail.org/plugin_download.php?id=153&rev=1303

CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
4.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2006-4169

Source: IDEFENSE
Type: UNKNOWN
20070711 SquirrelMail G/PGP Plugin gpg_help.php Local File Inclusion Vulnerability

Source: OSVDB
Type: UNKNOWN
37932

Source: OSVDB
Type: UNKNOWN
37933

Source: CCN
Type: SA26035
SquirrelMail G/PGP Encryption Plugin Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
26035

Source: SECUNIA
Type: UNKNOWN
26424

Source: GENTOO
Type: UNKNOWN
GLSA-200708-08

Source: CCN
Type: GLSA-200708-08
SquirrelMail G/PGP plugin: Arbitrary code execution

Source: CCN
Type: OSVDB ID: 37932
SquirrelMail G/PGP (GPG) Plugin gpg_help.php help Parameter Traversal Local File Inclusion

Source: CCN
Type: OSVDB ID: 37933
SquirrelMail G/PGP (GPG) Plugin gpg_help_base.php help Parameter Traversal Local File Inclusion

Source: BID
Type: UNKNOWN
24874

Source: CCN
Type: BID-24874
SquirrelMail G/PGP Encryption Plug-in Multiple Remote Command Execution Vulnerabilities

Source: CCN
Type: G/PGP Encryption Plugin for SquirrelMail Web site
SquirrelMail - Webmail for Nuts!

Source: VUPEN
Type: UNKNOWN
ADV-2007-2513

Source: XF
Type: UNKNOWN
squirrelmail-gpgp-help-file-include(35362)

Source: XF
Type: UNKNOWN
squirrelmail-gpgp-help-file-include(35362)

Source: CCN
Type: iDefense Labs PUBLIC ADVISORY: 07.11.07
SquirrelMail G/PGP Plugin gpg_help.php Local File Inclusion Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:squirrelmail:gpg_plugin:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:squirrelmail:gpg_plugin:2.1_dev:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    squirrelmail gpg plugin 2.0
    squirrelmail gpg plugin 2.1_dev