First published: Sat Mar 17 2018(Updated: )
A directory traversal flaw in SquirrelMail 1.4.22 allows an authenticated attacker to exfiltrate (or potentially delete) files from the hosting server, related to ../ in the att_local_name field in Deliver.class.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/squirrelmail | ||
SquirrelMail | =1.4.22 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8741 has a medium severity rating due to its potential for file exfiltration and manipulation.
To fix CVE-2018-8741, upgrade SquirrelMail to a more secure version that addresses the directory traversal vulnerability.
CVE-2018-8741 affects SquirrelMail version 1.4.22 running on Debian Linux 7.0 and 8.0.
Yes, CVE-2018-8741 can be exploited remotely by an authenticated attacker with access to the SquirrelMail application.
CVE-2018-8741 can lead to unauthorized access to sensitive files, which compromises data integrity and confidentiality.