Описание
openwebmail_init in Open WebMail 1.81 and earlier allows local users to execute arbitrary code via .. (dot dot) sequences in a login name, such as the name provided in the sessionid parameter for openwebmail-abook.pl, which is used to find a configuration file that specifies additional code to be executed.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:open_webmail:open_webmail:1.7:*:*:*:*:*:*:*
cpe:2.3:a:open_webmail:open_webmail:1.8:*:*:*:*:*:*:*
cpe:2.3:a:open_webmail:open_webmail:1.71:*:*:*:*:*:*:*
cpe:2.3:a:open_webmail:open_webmail:1.81:*:*:*:*:*:*:*
EPSS
Процентиль: 15%
0.00051
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
больше 22 лет назад
openwebmail_init in Open WebMail 1.81 and earlier allows local users t ...
github
больше 3 лет назад
openwebmail_init in Open WebMail 1.81 and earlier allows local users to execute arbitrary code via .. (dot dot) sequences in a login name, such as the name provided in the sessionid parameter for openwebmail-abook.pl, which is used to find a configuration file that specifies additional code to be executed.
EPSS
Процентиль: 15%
0.00051
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other