First published: Sat Feb 25 2006(Updated: )
Multiple directory traversal vulnerabilities in NOCC Webmail 1.0 allow remote attackers to include arbitrary files via .. (dot dot) sequences and a trailing NULL (%00) byte in (1) the _SESSION['nocc_theme'] parameter in (a) html/footer.php; and (2) the lang and (3) theme parameters and the (4) Accept-Language HTTP header field, when force_default_lang is disabled, in (b) index.php, as demonstrated by injecting PHP code into a profile and accessing it using the lang parameter in index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
nCipher | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0891 is classified as a critical vulnerability due to its capability to allow remote attackers to exploit directory traversal.
To fix CVE-2006-0891, it is recommended to upgrade to a newer version of NOCC Webmail that addresses this vulnerability.
CVE-2006-0891 can lead to unauthorized access to sensitive files on the server, potentially compromising system security.
CVE-2006-0891 affects users of NOCC Webmail version 1.0.
CVE-2006-0891 can be exploited through crafted requests utilizing directory traversal techniques.