header-logo
Suggest Exploit
vendor:
Webmail
by:
SecurityFocus
7.5
CVSS
HIGH
Database Access
200
CWE
Product Name: Webmail
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Postaci Webmail Default Configuration Vulnerability

PostACI Webmail stores database username and password information in a file called global.inc. This file is world-readable and stored in a directory accessible by a web browser over the internet. As a result, an attacker can retrieve the global.inc file with a web browser on a typical system (default configuration). Once obtained, the attacker may be able to access the systems database.

Mitigation:

Ensure that the global.inc file is not world-readable and is not accessible by a web browser.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/2029/info

Postaci Webmail is a database-driven web e-mail system. PostACI contains a vulnerability in its default configuration that may allow a remote attacker to gain access to the underlying database.

Webmail stores database username and password information in a file called global.inc. This file is world-readable and stored in a directory accessible by a web browser over the internet. As a result, an attacker can retrieve the global.inc file with a web browser on a typical system (default configuration). Once obtained, the attacker may be able to access the systems database.

Successful exploitation will lead to the attacker gaining unauthorized access to the database.

Depending on the database and system type, this may lead to a compromise of interactive access on the host running Webmail and the database. 

http://target/includes/global.inc