Description
|
|
Multiple vulnerabilities were identified in HiveMail, which could be exploited by remote attackers to execute arbitrary commands and scripting code.
The first issue is due to input validation errors in the "addressbook.update.php", "addressbook.add.php", "folders.update.php", "calendar.event.php", "index.php", "pop.download.php", "read.bounce.php", "rules.block.php" and "language.php" scripts that fail to properly validate the "contactgroupid", "messageid" and "folderid" variables, which could be exploited by remote attackers to execute arbitrary commands with the privileges of the web server.
The second flaw is due to an input validation error in the "index.php" script that does not properly validate the "$_SERVER['PHP_SELF']" variable, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The third vulnerability is due to an input validation error in the "index.php" script that does not properly validate the "folderid" variable before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
|