Vulnerability Name:

CVE-2006-5449 (CCN-29805)

Assigned:2006-10-18
Published:2006-10-18
Updated:2011-03-08
Summary:procmail in Ingo H3 before 1.1.2 Horde module allows remote authenticated users to execute arbitrary commands via shell metacharacters in the mailbox destination of a filter rule.
This vulnerability is addressed in the following product release:
Horde, Ingo, 1.1.2
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
4.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: Patch
http://bugs.horde.org/ticket/?Horde=6ed1a009f3396864553976a45948339e&id=4513

Source: MITRE
Type: CNA
CVE-2006-5449

Source: CCN
Type: Horde Release Announcement
[announce] Ingo H3 (1.1.2) (final)

Source: MLIST
Type: Patch
[horde-announce] 20061018 Ingo H3 (1.1.2) (final)

Source: CCN
Type: SA22482
Ingo Folder Name Shell Command Injection Vulnerability

Source: SECUNIA
Type: Patch, Vendor Advisory
22482

Source: SECUNIA
Type: UNKNOWN
22656

Source: SECUNIA
Type: UNKNOWN
23100

Source: DEBIAN
Type: UNKNOWN
DSA-1204

Source: DEBIAN
Type: DSA-1204
ingo1 -- missing input sanitising

Source: CCN
Type: GLSA-200611-22
Ingo H3: Folder name shell command injection

Source: GENTOO
Type: UNKNOWN
GLSA-200611-22

Source: CCN
Type: Ingo Download Web site
Ingo Download

Source: CCN
Type: Ingo Web site
Ingo

Source: CCN
Type: OSVDB ID: 29894
Ingo Folder Name Arbitrary Command Injection

Source: BID
Type: Patch
20637

Source: CCN
Type: BID-20637
Ingo Procmail Driver Shell Command Execution Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2006-4124

Source: XF
Type: UNKNOWN
ingo-procmail-command-execution(29805)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:horde:ingo_h3:*:*:*:*:*:*:*:* (Version <= 1.1.1)

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:1204
    V
    missing input sanitising
    2006-11-02
    BACK
    horde ingo h3 *