vendor:
hMailServer
by:
Nine:Situations:Group::strawdog
8.8
CVSS
HIGH
Local & Remote File Inclusion
22
CWE
Product Name: hMailServer
Affected Version From: 4.4.2002
Affected Version To: 4.4.2002
Patch Exists: YES
Related CWE: N/A
CPE: a:hmailserver:hmailserver:4.4.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2006
hMAilServer 4.4.2 (PHPWebAdmin) local & remote file inclusion poc
hMailServer 4.4.2 is vulnerable to local and remote file inclusion. An attacker can exploit this vulnerability to gain access to sensitive information such as administrator password and database password. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'page' and 'hmail_config[includepath]' parameters in the 'index.php' and 'initialize.php' scripts. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences and a malicious file name to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information.
Mitigation:
The vendor has released a patch to address this vulnerability. It is recommended to apply the patch as soon as possible.