10
CVSSv2

CVE-2001-0021

Published: 16/02/2001 Updated: 10/10/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

MailMan Webmail 3.0.25 and previous versions allows remote malicious users to execute arbitrary commands via shell metacharacters in the alternate_template parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

endymion mailman webmail 3.0.15

endymion mailman webmail 3.0.16

endymion mailman webmail 3.0.24

endymion mailman webmail 3.0.25

endymion mailman webmail 3.0

endymion mailman webmail 3.0.1

endymion mailman webmail 3.0.18

endymion mailman webmail 3.0.19

endymion mailman webmail 3.0.13

endymion mailman webmail 3.0.14

endymion mailman webmail 3.0.22

endymion mailman webmail 3.0.23

endymion mailman webmail 3.0.10

endymion mailman webmail 3.0.11

endymion mailman webmail 3.0.12

endymion mailman webmail 3.0.20

endymion mailman webmail 3.0.21

Exploits

source: wwwsecurityfocuscom/bid/2063/info A vulnerability exists in 3x versions of Endymion MailMan Webmail prior to release 3026 The widely-used Perl script provides a web-email interface Affected versions make insecure use of the perl open() function Attackers can control the way open() is supposed to work and execute arbitrary ...