vendor:
openwebmail package
by:
deadbeat
7.2
CVSS
HIGH
Local Privilege Escalation
264
CWE
Product Name: openwebmail package
Affected Version From: 5
Affected Version To: 5
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2002
Cpanel Local Exploit
It has been reported that cPanels' openwebmail package, distributed as part of the cPanel CGI application, is vulnerable to an external file include vulnerability. Exploitation of this issue may result in local user privilage escalation. By manipulating environment variables a local attacker may supply, as an include file, an arbitrary local perl-script. This may make it possible to execute the included script with the rights of the openwebmail 'oom' script, which is by default setuid root.
Mitigation:
Restrict access to the openwebmail package and ensure that environment variables are not manipulated.