Vulnerability Details : CVE-2006-5449
procmail in Ingo H3 before 1.1.2 Horde module allows remote authenticated users to execute arbitrary commands via shell metacharacters in the mailbox destination of a filter rule.
Products affected by CVE-2006-5449
- cpe:2.3:a:horde:ingo_h3:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5449
1.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-5449
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
References for CVE-2006-5449
-
http://www.debian.org/security/2006/dsa-1204
[SECURITY] [DSA 1204-1] New ingo1 packages fix arbitrary shell command execution
-
http://secunia.com/advisories/22482
About Secunia Research | FlexeraPatch;Vendor Advisory
-
http://lists.horde.org/archives/announce/2006/000296.html
Patch
-
http://www.securityfocus.com/bid/20637
Patch
-
http://secunia.com/advisories/22656
About Secunia Research | Flexera
-
http://bugs.horde.org/ticket/?Horde=6ed1a009f3396864553976a45948339e&id=4513
Patch
-
http://www.vupen.com/english/advisories/2006/4124
-
http://secunia.com/advisories/23100
About Secunia Research | Flexera
-
http://www.gentoo.org/security/en/glsa/glsa-200611-22.xml
Ingo H3: Folder name shell command injection (GLSA 200611-22) — Gentoo security
Jump to