Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Uebimiau Session Directory Disclosure

Vulnerability Assessment Details

Uebimiau Session Directory Disclosure

Vulnerability Assessment Summary
Searches for the existence of sessions directory of UebiMiau

Detailed Explanation for this Vulnerability Assessment

UebiMiau is a simple and cross-plataform POP3/IMAP mail
reader written in PHP.

Uebimiau in default installation create one temporary folder
to store 'sessions' and other files. This folder is defined
in 'inc/config.php' as './database/'.

If the web administrator don't change this folder, a possible hacker
can exploit this using the follow request:

1) Insert index.php in each directory of the Uebimiau

2) Set variable $temporary_directory to a directory
not public and with restricted access, set permission
as read only to 'web server user' for each files in

3) Set open_basedir in httpd.conf to yours clients follow
the model below:

php_admin_value open_basedir

Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Noam Rathaus

Cables, Connectors

Samsung SM863 960GB SSD Enterprise (MZ7KM960HAHP-00005) used (VS0219-536)
Samsung SM863 960GB SSD Enterprise (MZ7KM960HAHP-00005) used (VS0219-536) pictureFor Samsung Galaxy Tab A 8" 2017 SM-T380 T385 Leather Case Cover Keyboard +Gift
For Samsung Galaxy Tab A 8


No Discussions have been posted on this vulnerability.