9.3
CVSSv2

CVE-2005-1924

Published: 31/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The G/PGP (GPG) Plugin 2.1 and previous versions for Squirrelmail allow remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the fpr parameter to the deleteKey function in gpg_keyring.php, as called by (a) import_key_file.php, (b) import_key_text.php, and (c) keyring_main.php; and (2) the keyserver parameter to the gpg_recv_key function in gpg_key_functions.php, as called by gpg_options.php. NOTE: this issue may overlap CVE-2007-3636.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

squirrelmail gpg plugin

Exploits

#!/usr/local/bin/ruby puts"backdoorednet\n" puts "SquirrelMail G/PG deletekey() command injection exploit\n" puts "backdoorednet Visit Us\n" puts "Coded by Backdoored member \n" puts "--------------------------------------------------\n" if ARGV[0] == nil && ARGV[1] == nil && ARGV[2] == nil && ARGV[ ...
SquirrelMail G/PGP Encryption Plug-in Remote Command Execution Vulnerability Bugtraq ID: 24782 ----------------------------- There are various vulnerabilities in this software! One is in keyring_mainphp! $fpr is not escaped from shellcommands! testbox:/home/w00t# cat /tmp/w00t cat: /tmp/w00t: No such file or directory testbox:/home/w00t# ***@ ...