webmail/modules/filesystem/edit.php in U-Mail Webmail server 4.91 allows remote attackers to overwrite arbitrary files via an absolute pathname in the path parameter and arbitrary content in the content parameter. NOTE: this can be leveraged for code execution by writing to a file under the web document root.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://secunia.com/advisories/32540 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46300 | vdb entry |
http://www.securityfocus.com/archive/1/497961/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/32013 | vdb entry exploit |
http://securityreason.com/securityalert/4565 | third party advisory |
https://www.exploit-db.com/exploits/6898 | exploit |