Basilix Webmail 1.0 File Disclosure Vulnerability

ID SSV:74844
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00


No description provided by source.


Basilix is a web-based mail application. It offers features such as mail attachments, address book, multiple language and theme support.

During operation, Basilix opens a PHP include file using a variable as the filename that can be supplied remotely. Basilix do not properly filter malicious user-supplied input. It is possible for remote attackers to have Basilix attempt to 'include' an arbitrary webserver-readable file.

This vulnerability may disclose sensitive information contained in arbitrary web-readable files. It may also be possible for remote attackers to execute php files.[DUMMY]=../../../../etc/passwd&RequestID=DUMMY&username=blah&password=blah