PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and previous versions, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote malicious users to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
squirrelmail squirrelmail 1.4.2 |
||
squirrelmail squirrelmail 1.0.5 |
||
squirrelmail squirrelmail 1.4.6_rc1 |
||
squirrelmail squirrelmail 1.4.3_r3 |
||
squirrelmail squirrelmail 1.2.7 |
||
squirrelmail squirrelmail 1.2.0 |
||
squirrelmail squirrelmail 1.2.9 |
||
squirrelmail squirrelmail 1.4.3_rc1 |
||
squirrelmail squirrelmail 1.2.2 |
||
squirrelmail squirrelmail 1.4.4_rc1 |
||
squirrelmail squirrelmail 1.4.3 |
||
squirrelmail squirrelmail 1.2.1 |
||
squirrelmail squirrelmail 1.4.1 |
||
squirrelmail squirrelmail 1.4.0 |
||
squirrelmail squirrelmail 1.4 |
||
squirrelmail squirrelmail 1.2.4 |
||
squirrelmail squirrelmail 1.2.3 |
||
squirrelmail squirrelmail 1.4.3a |
||
squirrelmail squirrelmail |
||
squirrelmail squirrelmail 1.0.4 |
||
squirrelmail squirrelmail 1.2.6 |
||
squirrelmail squirrelmail 1.4.4 |
||
squirrelmail squirrelmail 1.2.10 |
||
squirrelmail squirrelmail 1.2.5 |
||
squirrelmail squirrelmail 1.2.8 |
||
squirrelmail squirrelmail 1.2.11 |
||
squirrelmail squirrelmail 1.4.5 |