First published: Wed Nov 30 2011(Updated: )
Hastymail2 2.1.1 before RC2 allows remote attackers to execute arbitrary commands via the (1) rs or (2) rsargs[] parameter in a mailbox Drafts action to the default URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hastymail | =beta1 | |
Hastymail | =beta2 | |
Hastymail | =beta3 | |
Hastymail | =rc1 | |
Hastymail | =rc2 | |
Hastymail | =rc3 | |
Hastymail | =rc4 | |
Hastymail | =rc5 | |
Hastymail | =rc6 | |
Hastymail | =rc7 | |
Hastymail | =rc8 | |
Hastymail | =rc9 | |
Hastymail | <=2.1.1 | |
Hastymail | =1.0 | |
Hastymail | =1.01 | |
Hastymail | =1.1-rc1 | |
Hastymail | =1.1-rc2 | |
Hastymail | =2.0 | |
Hastymail | =2.0-a1 | |
Hastymail | =2.0-a2 | |
Hastymail | =2.0-b1 | |
Hastymail | =2.0-b2 | |
Hastymail | =2.0-b3 | |
Hastymail | =2.0-rc1 | |
Hastymail | =2.0.1 | |
Hastymail | =2.0.2 | |
Hastymail | =2.0.3 | |
Hastymail | =2.0.4 | |
Hastymail | =2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4542 has a high severity rating due to its potential for remote command execution.
To fix CVE-2011-4542, upgrade to a version of Hastymail2 that is released after RC2.
CVE-2011-4542 affects all Hastymail2 versions prior to RC2, including beta releases and RC versions 1 through 9.
CVE-2011-4542 can lead to remote code execution attacks, allowing attackers to execute arbitrary commands.
A temporary workaround for CVE-2011-4542 includes restricting access to the mailbox Drafts action for untrusted users.