SquirrelMail 1.2.11 – ‘move_messages.php’ Arbitrary File Moving

SquirrelMail 1.2.11 – ‘move_messages.php’ Arbitrary File Moving

漏洞ID 1053968 漏洞类型
发布时间 2003-06-17 更新时间 2003-06-17
图片[1]-SquirrelMail 1.2.11 – ‘move_messages.php’ Arbitrary File Moving-安全小百科CVE编号 N/A
图片[2]-SquirrelMail 1.2.11 – ‘move_messages.php’ Arbitrary File Moving-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22791
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7952/info

Multiple vulnerabilities have been reported for Squirrelmail which could allow for information disclosure, data corruption, and privilege escalation.

The problems appear to occur due to insufficient sanitization of URI parameters submitted within HTTP requests.

*** It has been discovered that all information disclosure and data corruption issues are in fact not vulnerabilities. The issue lies in the default IMAP configuration, allowing a remote authenticated user to specify their local mailbox file. This behaviour is clearly specified in the IMAP FAQ.

All actions carried out by an authenticated user are done with their own local system privileges, effectively having no affect on the system. This information has been confirmed by the vendor.

It should also be noted that the vendor has announced that the privilege elevation issue is indeed legitimate. In the future this BID will be re-used to cover that vulnerability alone. 


http://www.example.com/src/move_messages.php?msg=1&mailbox=[file_you_want_to_move]&startMessage=1&targetMailbox=[target_mailbox_here]

相关推荐: Aldap Contact Manager Authentication Bypass Vulnerability

Aldap Contact Manager Authentication Bypass Vulnerability 漏洞ID 1101211 漏洞类型 Access Validation Error 发布时间 2002-12-03 更新时间 2002-12-0…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享