vendor:
MundiMail
by:
Ccat Research Labs
8.8
CVSS
HIGH
Command Injection
78
CWE
Product Name: MundiMail
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Debian, Centos & Windows Server 2000
2020
System() and Exec() Vulnerability in MundiMail
The MundiMail software is vulnerable to command injection due to the use of System() and Exec() without proper security practices. An attacker can exploit this vulnerability by sending a malicious command in the 'mypid' and 'idtag' parameters of the 'status/index.php' page. This will allow the attacker to execute arbitrary commands on the server.
Mitigation:
The vulnerability can be mitigated by using the escapeshellcmd() function to sanitize user input.