First published: Sun Jul 15 2007(Updated: )
Multiple directory traversal vulnerabilities in the G/PGP (GPG) Plugin 2.0, and 2.1dev before 20070614, for Squirrelmail allow remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the help parameter to (1) gpg_help.php or (2) gpg_help_base.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail GPG Plugin | =2.0 | |
SquirrelMail GPG Plugin | =2.1_dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4169 is considered a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2006-4169, update the GPG Plugin for SquirrelMail to version 2.1dev or later released after June 14, 2007.
CVE-2006-4169 affects users of the GPG Plugin versions 2.0 and 2.1dev of SquirrelMail.
CVE-2006-4169 enables authenticated remote users to execute arbitrary local files on the server.
You can determine if you are using a vulnerable version of GPG Plugin by checking your installation against the versions 2.0 or 2.1dev prior to the patch date of June 14, 2007.