Lucene search

K
exploitdbMichael R. RudelEDB-ID:20450
HistoryNov 30, 2000 - 12:00 a.m.

Trlinux Postaci Webmail 1.1.3 - Password Disclosure

2000-11-3000:00:00
Michael R. Rudel
www.exploit-db.com
26

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/2029/info

Postaci Webmail is a database-driven web e-mail system. PostACI contains a vulnerability in its default configuration that may allow a remote attacker to gain access to the underlying database.

Webmail stores database username and password information in a file called global.inc. This file is world-readable and stored in a directory accessible by a web browser over the internet. As a result, an attacker can retrieve the global.inc file with a web browser on a typical system (default configuration). Once obtained, the attacker may be able to access the systems database.

Successful exploitation will lead to the attacker gaining unauthorized access to the database.

Depending on the database and system type, this may lead to a compromise of interactive access on the host running Webmail and the database. 

http://target/includes/global.inc 

AI Score

7.4

Confidence

Low

Related for EDB-ID:20450