Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in V-webmail 1.6.4 allow remote attackers to execute arbitrary PHP code via a URL in the (1) CONFIG[pear_dir] parameter to (a) Mail/RFC822.php, (b) Net/Socket.php, (c) XML/Parser.php, (d) XML/Tree.php, (e) Mail/mimeDecode.php, (f) Console/Getopt.php, (g) System.php, (h) Log.php, and (i) File.php in includes/pear/; the CONFIG[pear_dir] parameter to (j) includes/prepend.php, and (k) includes/cachedConfig.php; and the (2) CONFIG[includes] parameter to (l) prepend.php and (m) email.list.search.php in includes/. NOTE: the CONFIG[pear_dir] parameter to includes/mailaccess/pop3.php is already covered by CVE-2006-2666.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Christof Bruyland | V-Webmail | 1.6.4 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.org/0807-exploits/vwebmail-rfi.txtExploit
- http://www.securityfocus.com/bid/30162Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46680
- http://packetstormsecurity.org/0807-exploits/vwebmail-rfi.txtExploit
- http://www.securityfocus.com/bid/30162Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46680
FAQ
What is CVE-2008-6840?
CVE-2008-6840 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Multiple PHP remote file inclusion vulnerabilities in V-webmail 1.6.4 allow remote attackers to execute arbitrary PHP code via a URL in the (1) CONFIG[pear_dir] parameter to (a) Mail/RFC822.php, (b) N...
How severe is CVE-2008-6840?
CVE-2008-6840 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-6840?
Check the references section above for vendor advisories and patch information. Affected products include: Christof Bruyland V-Webmail.