ID SSV:74844 Type seebug Reporter Root Modified 2014-07-01T00:00:00
Description
No description provided by source.
source: http://www.securityfocus.com/bid/2995/info
Basilix is a web-based mail application. It offers features such as mail attachments, address book, multiple language and theme support.
During operation, Basilix opens a PHP include file using a variable as the filename that can be supplied remotely. Basilix do not properly filter malicious user-supplied input. It is possible for remote attackers to have Basilix attempt to 'include' an arbitrary webserver-readable file.
This vulnerability may disclose sensitive information contained in arbitrary web-readable files. It may also be possible for remote attackers to execute php files.
http://beta.basilix.org/basilix.php3?request_id[DUMMY]=../../../../etc/passwd&RequestID=DUMMY&username=blah&password=blah
{"href": "https://www.seebug.org/vuldb/ssvid-74844", "status": "cve,poc", "bulletinFamily": "exploit", "modified": "2014-07-01T00:00:00", "title": "Basilix Webmail 1.0 File Disclosure Vulnerability", "cvss": {"vector": "NONE", "score": 0.0}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-74844", "cvelist": [], "description": "No description provided by source.", "viewCount": 3, "published": "2014-07-01T00:00:00", "sourceData": "\n source: http://www.securityfocus.com/bid/2995/info\r\n\r\nBasilix is a web-based mail application. It offers features such as mail attachments, address book, multiple language and theme support.\r\n\r\nDuring operation, Basilix opens a PHP include file using a variable as the filename that can be supplied remotely. Basilix do not properly filter malicious user-supplied input. It is possible for remote attackers to have Basilix attempt to 'include' an arbitrary webserver-readable file.\r\n\r\nThis vulnerability may disclose sensitive information contained in arbitrary web-readable files. It may also be possible for remote attackers to execute php files. \r\n\r\nhttp://beta.basilix.org/basilix.php3?request_id[DUMMY]=../../../../etc/passwd&RequestID=DUMMY&username=blah&password=blah \n ", "id": "SSV:74844", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T14:49:02", "reporter": "Root", "enchantments": {"score": {"value": -0.1, "vector": "NONE", "modified": "2017-11-19T14:49:02", "rev": 2}, "dependencies": {"references": [], "modified": "2017-11-19T14:49:02", "rev": 2}, "vulnersScore": -0.1}, "references": []}