First published: Thu Oct 12 2006(Updated: )
CRLF injection vulnerability in lib/session.php in Hastymail 1.5 and earlier before 20061008 allows remote authenticated users to send arbitrary IMAP commands via a CRLF sequence in a mailbox name. NOTE: the attack crosses privilege boundaries if the IMAP server configuration prevents a user from establishing a direct IMAP session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phlymail | <=1.5 | |
Phlymail | =1.0.1 | |
Phlymail | =1.0.2 | |
Phlymail | =1.1 | |
Phlymail | =1.2 | |
<=1.5 | ||
=1.0.1 | ||
=1.0.2 | ||
=1.1 | ||
=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5262 has a high severity level due to the potential for remote authenticated users to send arbitrary IMAP commands.
To fix CVE-2006-5262, upgrade to a version of Hastymail released after October 8, 2006.
CVE-2006-5262 affects Hastymail versions 1.5 and earlier.
Yes, CVE-2006-5262 can lead to privilege escalation if the IMAP server configuration allows it.
CVE-2006-5262 can be exploited by remote authenticated users leveraging a CRLF injection in mailbox names.