PHP remote file inclusion vulnerability in webmail.php in SquirrelMail before 1.4.4 allows remote attackers to execute arbitrary PHP code by modifying a URL parameter to reference a URL on a remote web server that contains the code.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html - Patch, Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=110702772714662&w=2 - | |
References | () http://secunia.com/advisories/13962/ - Patch, Vendor Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200501-39.xml - | |
References | () http://www.redhat.com/support/errata/RHSA-2005-099.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2005-135.html - Patch, Vendor Advisory | |
References | () http://www.squirrelmail.org/security/issue/2005-01-19?PHPSESSID=8af117822fb1ca3aa966a64248b5d223 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19037 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10670 - |
Information
Published : 2005-01-24 05:00
Updated : 2024-11-20 23:54
NVD link : CVE-2005-0103
Mitre link : CVE-2005-0103
CVE.ORG link : CVE-2005-0103
JSON object : View
Products Affected
squirrelmail
- squirrelmail
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')