Summary
The remote web server contains a PHP script that is prone to information disclosure.
Description :
The remote host appears to be running a BasiliX version 1.1.0 or lower. Such versions allow retrieval of arbitrary files that are accessible to the web server user when sending a message since they accept a list of attachment names from the client yet do not verify that the attachments were in fact uploaded.
Further, since these versions do not sanitize input to the 'login.php3' script, it's possible for an attacker to establish a session on the target without otherwise having access there by authenticating against an IMAP server of his or her choosing.
Solution
Upgrade to BasiliX version 1.1.1 or later.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2002-1710 -
CVSS Base Score: 3.6
AV:L/AC:L/Au:N/C:P/I:P/A:N
Related Vulnerabilities
- Kusaba X Multiple Cross Site Scripting Vulnerabilities
- phpShop 'page' Parameter Cross Site Scripting Vulnerability
- MantisBT 'adm_config_report.php' Cross-Site Scripting Vulnerability - January15
- MODx Local File Include and Cross Site Scripting Vulnerabilities
- Apache mod_perl 'Apache::Status' and 'Apache2::Status' Cross Site Scripting Vulnerability