Vulnerability Description
Hypermail allows remote attackers to execute arbitrary commands on a server supporting SSI via an attachment with a .shtml extension, which is archived on the server and can then be executed by requesting the URL for the attachment.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hypermail Development | Hypermail | All versions |
Related Weaknesses (CWE)
References
- http://marc.info/?l=bugtraq&m=100626603407639&w=2Third Party Advisory
- http://www.hypermail.org/dist/hypermail-2.1.4.tar.gzBroken LinkVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7576Third Party AdvisoryVDB Entry
- http://marc.info/?l=bugtraq&m=100626603407639&w=2Third Party Advisory
- http://www.hypermail.org/dist/hypermail-2.1.4.tar.gzBroken LinkVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7576Third Party AdvisoryVDB Entry
FAQ
What is CVE-2001-0901?
CVE-2001-0901 is a vulnerability with a CVSS score of 7.5 (HIGH). Hypermail allows remote attackers to execute arbitrary commands on a server supporting SSI via an attachment with a .shtml extension, which is archived on the server and can then be executed by reques...
How severe is CVE-2001-0901?
CVE-2001-0901 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0901?
Check the references section above for vendor advisories and patch information. Affected products include: Hypermail Development Hypermail.