First published: Thu Dec 26 2002(Updated: )
openwebmail_init in Open WebMail 1.81 and earlier allows local users to execute arbitrary code via .. (dot dot) sequences in a login name, such as the name provided in the sessionid parameter for openwebmail-abook.pl, which is used to find a configuration file that specifies additional code to be executed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open Webmail | =1.7 | |
Open Webmail | =1.8 | |
Open Webmail | =1.71 | |
Open Webmail | =1.81 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1385 is considered a high severity vulnerability due to its potential to allow arbitrary code execution by local users.
The fix for CVE-2002-1385 involves upgrading to a later version of Open WebMail that addresses this vulnerability.
CVE-2002-1385 affects local users of Open WebMail versions 1.7 through 1.81.
CVE-2002-1385 is a directory traversal vulnerability that allows unauthorized access to system files.
Exploitation of CVE-2002-1385 occurs when malicious users provide specially crafted login names using dot dot sequences.