Multiple eval injection vulnerabilities in HiveMail 1.3 and earlier allow remote attackers to execute arbitrary PHP code via (1) the contactgroupid parameter in addressbook.update.php, (2) the messageid parameter in addressbook.add.php, (3) the folderid parameter in folders.update.php, and possibly certain parameters in (4) calendar.event.php, (5) index.php, (6) pop.download.php, (7) read.bounce.php, (8) rules.block.php, (9) language.php, and (10) certain other scripts, as demonstrated by an addressbook.update.php request with a contactgroupid value of phpinfo() preceded by facilitators.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2006-02-18T02:00:00
Updated: 2024-08-07T16:48:55.788Z
Reserved: 2006-02-18T00:00:00
Link: CVE-2006-0757
Vulnrichment
No data.
NVD
Status : Modified
Published: 2006-02-18T02:02:00.000
Modified: 2024-11-21T00:07:16.127
Link: CVE-2006-0757
Redhat
No data.