| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.2 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Ilohamail up to 0.7.8. It has been classified as critical. This issue affects some unknown processing of the file compose.php. The manipulation leads to privileges management (File). There is no exploit available. Upgrading the affected component is recommended.
Details
A vulnerability was found in Ilohamail up to 0.7.8. It has been rated as critical. This issue affects an unknown code block of the file compose.php. The manipulation with an unknown input leads to a privileges management vulnerability (File). Using CWE to declare the problem leads to CWE-269. The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. Impacted is integrity, and availability.
The weakness was shared 01/28/2003. The exploitation is known to be easy. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details are known, but no exploit is available. MITRE ATT&CK project uses the attack technique T1068 for this issue.
By approaching the search of inurl:compose.php it is possible to find vulnerable targets with Google Hacking. The vulnerability scanner Nessus provides a plugin with the ID 14632 (IlohaMail Attachment Arbitrary File Create/Overwrite), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CGI abuses and running in the context r.
Upgrading to version 0.7.9 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (11251), Tenable (14632), SecurityFocus (BID 6740†) and Vulnerability Center (SBV-5333†). The entries VDB-90811 and VDB-90810 are related to this item. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 6.2
VulDB Base Score: 6.5
VulDB Temp Score: 6.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Name: FileClass: Privileges management / File
CWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
Google Hack: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 14632
Nessus Name: IlohaMail Attachment Arbitrary File Create/Overwrite
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Ilohamail 0.7.9
Timeline
01/28/2003 🔍01/28/2003 🔍
01/28/2003 🔍
09/02/2004 🔍
09/08/2004 🔍
08/17/2016 🔍
09/13/2022 🔍
Sources
Status: Not definedGCVE (VulDB): GCVE-100-90809
X-Force: 11251
SecurityFocus: 6740 - IlohaMail Arbitrary File Attachment Upload Path Vulnerability
Vulnerability Center: 5333 - XSS in IlohaMail < 0.7.9 Allows Uploading and Overwriting Local Files, Medium
See also: 🔍
Entry
Created: 08/17/2016 14:27Updated: 09/13/2022 21:31
Changes: 08/17/2016 14:27 (52), 03/28/2019 23:13 (2), 09/13/2022 21:31 (2)
Complete: 🔍
Cache ID: 216::103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.