Basilix is a web-based mail application. It offers features such as mail attachments, address book, multiple language and theme support. The login script('login.php3') in Basilix is prone to an input validation problem. This issue can be exploited if an attacker submits a specially crafted web request, which contains malicious arguments for the "$username" variable. The affected script will attempt to connect to an IMAP server to authenticate the user. Ideally, the attacker will have set up their own IMAP server and defined it as an argument in the malicious web request. Commands submitted by the attacker will be executed with the privileges of webserver running Basilix. Remote command execution may enable to attacker to display sensitive information or even gain local access to the host.
Basilix is a web-based mail application. It offers features such as mail attachments, address book, multiple language and theme support. The login script('login.php3') in Basilix is prone to an input validation problem. This issue can be exploited if an attacker submits a specially crafted web request, which contains malicious arguments for the "$username" variable. The affected script will attempt to connect to an IMAP server to authenticate the user. Ideally, the attacker will have set up their own IMAP server and defined it as an argument in the malicious web request. Commands submitted by the attacker will be executed with the privileges of webserver running Basilix. Remote command execution may enable to attacker to display sensitive information or even gain local access to the host.