Horde IMP Remote Command Execution...

- AV AC AU C I A
发布: 2000-09-18
修订: 2025-04-13

IMP is a powerful web-based mail interface/client that is developed by the members of the Horde project. Bugtraq ID 1674 detailed a vulnerability in IMP that allowed a malicious user to execute arbitrary commands on the victim host due to certain user input not being validated. The problem was partially corrected in versions 2.2.1 of IMP and 1.2.1 of Horde as checks were added to ensure that shell metacharacters were escaped. Unfortunately, it is still possible to execute commands on a webserver running vulnerable versions (including 1.2.1/2.2.1) of Horde/IMP due to the use of sendmail and the disclosure of file information by IMP. The problem begins where the patch left off, the passing of user input to popen(). The popen call is used to execute sendmail, the command-line mail transfer program. The PHP script, while escaping shell metacharacters, does not check to ensure that data which could be interpreted as arguments to "sendmail" are passed. As a result, it is possible to...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息