Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SCAN:MISC:HTTP:SENDMESSAGE

Severity

Info

Recommended

No

Category

SCAN

Keywords

Sendmessage.cgi Access

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SCAN: Sendmessage.cgi Access


This signature detects access to the vulnerable sendmessage.cgi script. Attackers can execute arbitrary commands on the server.

Extended Description

W3Mail is a full featured open source web mail application implemented as a collection of Perl scripts that runs on Linux and Unix systems. It includes support for sending mail. When sending email, values passed as script parameters are used as part of a shell command. Shell meta characters are not properly filtered from this input. A maliciously formed URL submitted to the script could contain additional shell commands, which would then be executed by the web server user (generally 'nobody'). As a result, an attacker may execute arbitrary code on the vulnerable server. Earlier versions of W3Mail may also be vulnerable.

Affected Products

  • CascadeSoft W3Mail 1.0.2

References

  • BugTraq: 3673
  • CVE: CVE-2001-1100
  • URL: http://www.securityfocus.com/archive/1/218921

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out