16 lines
No EOL
832 B
Text
16 lines
No EOL
832 B
Text
source: https://www.securityfocus.com/bid/20109/info
|
|
|
|
Neon WebMail is prone to multiple input-validation vulnerabilities because it fails to sanitize user-supplied input. These issues include:
|
|
|
|
- an arbitrary-file-upload vulnerability
|
|
- an arbitrary-email-manipulation vulnerability
|
|
- multiple SQL-injection vulnerabilities
|
|
- an unauthorized-access vulnerability
|
|
- multiple directory-traversal vulnerabilities
|
|
- an HTML-injection vulnerability.
|
|
|
|
An attacker can exploit these issues to compromise the affected application.
|
|
|
|
Versions 5.06 and 5.07 (build.200607050) are vulnerable to these issue; prior versions may also be affected.
|
|
|
|
http://www.example.com/neonwebmail/maillist?getpost=get&PAGE=1&folderid=-1&sysid=0&sortkey=SENDER, rand(benchmark(1000000000000,sha1('123456781234567812345678')))&sortkey_desc=&sendkind=&searchlist= |