Vulnerability Details : CVE-2018-8741
A directory traversal flaw in SquirrelMail 1.4.22 allows an authenticated attacker to exfiltrate (or potentially delete) files from the hosting server, related to ../ in the att_local_name field in Deliver.class.php.
Vulnerability category: Directory traversal
Products affected by CVE-2018-8741
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.22:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-8741
0.36%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-8741
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2018-8741
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-8741
-
https://gist.github.com/hannob/3c4f86863c418930ad08853c1109364e
squirrelmail quick fix for file disclosure vuln presented at Troopers 2018 (#TR18) · GitHubPatch;Third Party Advisory
-
https://www.debian.org/security/2018/dsa-4168
Debian -- Security Information -- DSA-4168-1 squirrelmailThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVXTYMZ35IC5KPNMAE6BWAQWURMX7KZO/
[SECURITY] Fedora 30 Update: squirrelmail-1.4.23-1.fc30.20190710 - package-announce - Fedora Mailing-Lists
-
http://www.securitytracker.com/id/1040554
SquirrelMail Input Validation Flaw in 'Deliver.class.php' Lets Remote Authenticated Users View Files on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
https://lists.debian.org/debian-lts-announce/2018/04/msg00012.html
[SECURITY] [DLA 1344-1] squirrelmail security updateMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2018/03/17/2
oss-security - Squirrelmail directory traversal vulnerability allows exfiltrating files from serverMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5FP5O562A4FM5TCFNEW73SS6PZONSAC/
[SECURITY] Fedora 29 Update: squirrelmail-1.4.23-1.fc29.20190710 - package-announce - Fedora Mailing-Lists
-
https://paste.pound-python.org/show/OjSLiFTxiBrTk63jqEUu/
Paste #OjSLiFTxiBrTk63jqEUu at spacepasteThird Party Advisory
-
https://insinuator.net/2018/03/squirrelmail-full-disclosure-troopers18/
Squirrelmail Full Disclosure – TROOPERS18 – Insinuator.netPatch;Third Party Advisory
Jump to