Vulnerability Name: | CVE-2006-5449 (CCN-29805) | ||||||||
Assigned: | 2006-10-18 | ||||||||
Published: | 2006-10-18 | ||||||||
Updated: | 2011-03-08 | ||||||||
Summary: | procmail in Ingo H3 before 1.1.2 Horde module allows remote authenticated users to execute arbitrary commands via shell metacharacters in the mailbox destination of a filter rule. This vulnerability is addressed in the following product release: Horde, Ingo, 1.1.2 | ||||||||
CVSS v3 Severity: | 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P) 4.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
6.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CONFIRM Type: Patch http://bugs.horde.org/ticket/?Horde=6ed1a009f3396864553976a45948339e&id=4513 Source: MITRE Type: CNA CVE-2006-5449 Source: CCN Type: Horde Release Announcement [announce] Ingo H3 (1.1.2) (final) Source: MLIST Type: Patch [horde-announce] 20061018 Ingo H3 (1.1.2) (final) Source: CCN Type: SA22482 Ingo Folder Name Shell Command Injection Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory 22482 Source: SECUNIA Type: UNKNOWN 22656 Source: SECUNIA Type: UNKNOWN 23100 Source: DEBIAN Type: UNKNOWN DSA-1204 Source: DEBIAN Type: DSA-1204 ingo1 -- missing input sanitising Source: CCN Type: GLSA-200611-22 Ingo H3: Folder name shell command injection Source: GENTOO Type: UNKNOWN GLSA-200611-22 Source: CCN Type: Ingo Download Web site Ingo Download Source: CCN Type: Ingo Web site Ingo Source: CCN Type: OSVDB ID: 29894 Ingo Folder Name Arbitrary Command Injection Source: BID Type: Patch 20637 Source: CCN Type: BID-20637 Ingo Procmail Driver Shell Command Execution Vulnerability Source: VUPEN Type: UNKNOWN ADV-2006-4124 Source: XF Type: UNKNOWN ingo-procmail-command-execution(29805) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |