[Forgot Password]
Login  Register Subscribe

23631

 
 

115036

 
 

95906

 
 

909

 
 

77949

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-4932

Date: (C)2008-11-05   (M)2017-08-08
 
CVSS Score: 9.0Access Vector: NETWORK
Exploitability Subscore: 8.0Access Complexity: LOW
Impact Subscore: 10.0Authentication: SINGLE_INSTANCE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











webmail/modules/filesystem/edit.php in U-Mail Webmail server 4.91 allows remote attackers to overwrite arbitrary files via an absolute pathname in the path parameter and arbitrary content in the content parameter. NOTE: this can be leveraged for code execution by writing to a file under the web document root.

Reference:
http://www.securityfocus.com/archive/1/archive/1/497961/100/0/threaded
BID-32013
SECUNIA-32540
SREASON-4565
MILW0RM-6898
umail-edit-file-upload(46300)

CWE    1
CWE-20

© 2013 SecPod Technologies