Secunia Security Advisory - beford has discovered a vulnerability in V-webmail, which can be exploited by malicious people to compromise a vulnerable system.
3c9cfbf4abd4b99b87e728e218e119d9e8218a9926b0cbe926f8e24195f6e656
TITLE:
V-webmail "CONFIG[pear_dir]" File Inclusion Vulnerability
SECUNIA ADVISORY ID:
SA20297
VERIFY ADVISORY:
http://secunia.com/advisories/20297/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
V-webmail 1.x
http://secunia.com/product/8122/
DESCRIPTION:
beford has discovered a vulnerability in V-webmail, which can be
exploited by malicious people to compromise a vulnerable system.
Input passed to the "CONFIG[pear_dir]" parameter in
"includes/mailaccess/pop3.php" isn't properly verified, before it is
used to include files. This can be exploited to include arbitrary
files from external and local resources.
Successful exploitation requires that "register_globals" is enabled
and that the "includes" directory is placed accessible inside the web
root (the installation instructions recommends to place the "includes"
directory outside the web root if possible)
NOTE: In version 1.3 then the affected script is reportedly named
"includes/mailaccess/pop3/core.php".
The vulnerability has been confirmed in version 1.6.4, and has also
been reported in versions 1.3 and 1.5.
SOLUTION:
Ensure that only the "htdocs" directory is accessible inside the web
root.
PROVIDED AND/OR DISCOVERED BY:
beford
ORIGINAL ADVISORY:
http://milw0rm.com/exploits/1827
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------