First published: Sat Dec 31 2005(Updated: )
The G/PGP (GPG) Plugin 2.1 and earlier for Squirrelmail allow remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the fpr parameter to the deleteKey function in gpg_keyring.php, as called by (a) import_key_file.php, (b) import_key_text.php, and (c) keyring_main.php; and (2) the keyserver parameter to the gpg_recv_key function in gpg_key_functions.php, as called by gpg_options.php. NOTE: this issue may overlap CVE-2007-3636.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail GPG Plugin | <=2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1924 has a medium severity rating due to its potential for remote command execution.
To fix CVE-2005-1924, upgrade the SquirrelMail GPG Plugin to a version later than 2.1.
CVE-2005-1924 affects SquirrelMail GPG Plugin versions 2.1 and earlier.
CVE-2005-1924 can be exploited by remote authenticated users to execute arbitrary commands.
The impact of CVE-2005-1924 includes unauthorized command execution, which can compromise system integrity and security.