Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> e107 Email Injection Vulnerability

Vulnerability Assessment Details

e107 Email Injection Vulnerability

Vulnerability Assessment Summary
Tries to send arbitrary email with e107

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP script that can be used to send
arbitrary e-mail messages.

Description :

The version of e107 installed on the remote host contains a script,
'email.php', that permits an unauthenticated user to send e-mail
messages to arbitrary users and to control to a large degree the
content of those messages. This issue can be exploited to send spam
or other types of abuse through the affected system.

See also :

Solution :

Either remove the affected script or upgrade to e107 version 0.7.5 or
later, which uses a 'captcha' system to minimize automated
exploitation of this issue.

Network Security Threat Level:

Medium / CVSS Base Score : 5.6

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors


No Discussions have been posted on this vulnerability.