CVE-2005-0103

PHP remote file inclusion vulnerability in webmail.php in SquirrelMail before 1.4.4 allows remote attackers to execute arbitrary PHP code by modifying a URL parameter to reference a URL on a remote web server that contains the code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html - Patch, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=110702772714662&w=2 - () http://marc.info/?l=bugtraq&m=110702772714662&w=2 -
References () http://secunia.com/advisories/13962/ - Patch, Vendor Advisory () http://secunia.com/advisories/13962/ - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200501-39.xml - () http://www.gentoo.org/security/en/glsa/glsa-200501-39.xml -
References () http://www.redhat.com/support/errata/RHSA-2005-099.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-099.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-135.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-135.html - Patch, Vendor Advisory
References () http://www.squirrelmail.org/security/issue/2005-01-19?PHPSESSID=8af117822fb1ca3aa966a64248b5d223 - Patch, Vendor Advisory () http://www.squirrelmail.org/security/issue/2005-01-19?PHPSESSID=8af117822fb1ca3aa966a64248b5d223 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19037 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19037 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10670 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10670 -

Information

Published : 2005-01-24 05:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0103

Mitre link : CVE-2005-0103

CVE.ORG link : CVE-2005-0103


JSON object : View

Products Affected

squirrelmail

  • squirrelmail
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')