CVE-2005-0103
Published Jan 24, 2005
Last updated 7 years ago
Overview
- Description
- PHP remote file inclusion vulnerability in webmail.php in SquirrelMail before 1.4.4 allows remote attackers to execute arbitrary PHP code by modifying a URL parameter to reference a URL on a remote web server that contains the code.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67E9817E-FF56-4FD0-B6C7-F4EEB25AD0CF" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EBF40C5-6272-427C-97A1-3CE3B1D47B12" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A55A98B3-34ED-4A90-BB78-50CB56B1B51F" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC5143ED-D4C5-4830-9C96-0B54D03679CB" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B765AEC-09E9-456C-8B57-09927E55D119" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AAFC3B0-DCE3-4190-B279-E095C666FA34" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9291A565-0BD6-4B5E-B45F-9DE65AB8159D" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6F53A84-FC66-4963-A728-7285F63D4761" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69A941FF-423E-49C5-AE1F-FE7ED016CA3D" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B34FDB1D-881B-4343-A76E-F23B93A0469A" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E4DCB20-2A7F-4EE4-BAFA-AD74CD4456AB" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "052914F8-B52C-4AB4-8F85-68D788B588C9" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "617C554F-8E7D-4F8A-AF63-C193934C8215" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15F11950-A2E4-4F57-BF87-57788B841A21" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "026730B8-3919-4100-8607-C640ADBDD662" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C179A3C-8C8C-429B-BACA-8ADAE4170465" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AD31177-05BB-4623-AED7-765DB7E44E47" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20247A22-9AB9-4BCE-BF28-350B52FBC62D" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79E6734C-EE1C-40B6-9759-15298707A6F5" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B08E51F1-3764-4146-89C1-20B9B8EE1222" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD4071B2-3D4F-4755-98B1-E28CEB05EA8B" } ], "operator": "OR" } ] } ]