#VU11169 Path traversal in SquirrelMail - CVE-2018-8741
Published: March 19, 2018 / Updated: March 20, 2018
Vulnerability identifier: #VU11169
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:U/U:Green
CVE-ID: CVE-2018-8741
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
SquirrelMail
SquirrelMail
Software vendor:
SquirrelMail Development Team
SquirrelMail Development Team
Description
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information on the target system.
The weakness exists due to input validation flaw in 'Deliver.class.php'. A remote attacker can upload a file with a specially crafted filename containing directory traversal characters (e.g., '../'), cause the system to attach arbitrary files to an email message with the privileges of the target PHP process and obtain or delete arbitrary files with the privileges of the target PHP process.
The weakness exists due to input validation flaw in 'Deliver.class.php'. A remote attacker can upload a file with a specially crafted filename containing directory traversal characters (e.g., '../'), cause the system to attach arbitrary files to an email message with the privileges of the target PHP process and obtain or delete arbitrary files with the privileges of the target PHP process.
Remediation
Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.