![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2002-1385 |
Description: | openwebmail_init in Open WebMail 1.81 and earlier allows local users to execute arbitrary code via .. (dot dot) sequences in a login name, such as the name provided in the sessionid parameter for openwebmail- abook.pl, which is used to find a configuration file that specifies additional code to be executed. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.11416 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2002-1385 BugTraq ID: 6425 http://www.securityfocus.com/bid/6425 Bugtraq: 20021218 Openwebmail 1.71 remote root compromise (Google Search) http://marc.info/?l=bugtraq&m=104031696120743&w=2 Bugtraq: 20021219 [Fix] Openwebmail 1.71 remote root compromise (Google Search) http://marc.info/?l=bugtraq&m=104032263328026&w=2 XForce ISS Database: open-webmail-command-execution(10904) https://exchange.xforce.ibmcloud.com/vulnerabilities/10904 |