ID CVE-2007-3058
Summary Multiple PHP remote file inclusion vulnerabilities in Madirish Webmail 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[basedir] parameter to (1) calendar.php, (2) compose.php, and (3) index.php, different vectors than CVE-2007-2826. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. A solution/patch has been released for these vulnerabilities: CVE-2007-2826 CVE-2007-3058 https://sourceforge.net/projects/madirishwebmail/ https://sourceforge.net/project/shownotes.phpgroup_id=101727&release_id=517013
References
Vulnerable Configurations
  • cpe:2.3:a:madirish_webmail:madirish_webmail:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:madirish_webmail:madirish_webmail:2.0:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 29-07-2017 - 01:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
osvdb
  • 36803
  • 36804
  • 36805
secunia 25475
xf madirish-basedir-file-include(34667)
Last major update 29-07-2017 - 01:31
Published 06-06-2007 - 01:30
Last modified 29-07-2017 - 01:31
Back to Top