ID CVE-2006-4169
Summary Multiple directory traversal vulnerabilities in the G/PGP (GPG) Plugin 2.0, and 2.1dev before 20070614, for Squirrelmail allow remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the help parameter to (1) gpg_help.php or (2) gpg_help_base.php. The vendor has addressed this issue in the following product update: http://www.squirrelmail.org/plugin_download.php?id=153&rev=1303
References
Vulnerable Configurations
  • cpe:2.3:a:squirrelmail:gpg_plugin:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:squirrelmail:gpg_plugin:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:squirrelmail:gpg_plugin:2.1_dev:*:*:*:*:*:*:*
    cpe:2.3:a:squirrelmail:gpg_plugin:2.1_dev:*:*:*:*:*:*:*
CVSS
Base: 5.5 (as of 20-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:P/A:N
refmap via4
bid 24874
gentoo GLSA-200708-08
idefense 20070711 SquirrelMail G/PGP Plugin gpg_help.php Local File Inclusion Vulnerability
osvdb
  • 37932
  • 37933
secunia
  • 26035
  • 26424
vupen ADV-2007-2513
xf squirrelmail-gpgp-help-file-include(35362)
Last major update 20-07-2017 - 01:32
Published 15-07-2007 - 22:30
Last modified 20-07-2017 - 01:32
Back to Top