Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> readmsg.php detection


Vulnerability Assessment Details

readmsg.php detection

Vulnerability Assessment Summary
Searches for the existence of Cobal Cube webmail

Detailed Explanation for this Vulnerability Assessment
/base/webmail/readmsg.php was detected.
Some versions of this CGI permit remote users to read local
files with the permission of the web server.
Note that if the user has a shell access, this kind of attack is
not interesting.

*** Nessus just checked the existence of this file
*** but did not try to exploit the flaw.

Solution : get a newer software from Cobalt

Reference : http://online.securityfocus.com/archive/1/195165

Network Security Threat Level: Low

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Michel Arboi

Cables, Connectors

Dell PowerEdge R710 2x X5690 3.46GHz 6 Core 96GB 6x 146GB 15K SAS PERC H700
$1134.0
Dell PowerEdge R710 2x X5690 3.46GHz 6 Core 96GB 6x 146GB 15K SAS PERC H700 pictureDell PowerEdge R720 2x E5-2630 v2 2.6Ghz 6 Core 48GB 8x 300GB 15K SAS H710
$2075.0
Dell PowerEdge R720 2x E5-2630 v2 2.6Ghz 6 Core 48GB 8x 300GB 15K SAS H710 pictureDELL PowerEdge R720 Server 2.60Ghz 16-Core 128GB 3x 300GB 15K 9x 4TB Enterprise
$2296.8
DELL PowerEdge R720 Server 2.60Ghz 16-Core 128GB 3x 300GB 15K 9x 4TB Enterprise picture


Discussions

No Discussions have been posted on this vulnerability.