vendor:
WebMail
by:
rgod
7,5
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: WebMail
Affected Version From: 2.0.2
Affected Version To: 2.0.2
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: PHP5
2006
iGENUS WebMail <= 2.0.2 remote commads xctn
This exploit allows an attacker to execute arbitrary commands on a vulnerable iGENUS WebMail server. The vulnerability exists due to the use of register_globals and allow_url_fopen in PHP5. An attacker can use a specially crafted URL to execute arbitrary commands on the vulnerable server.
Mitigation:
Disable register_globals and allow_url_fopen in PHP5.