load_prefs.php and supporting include files in SquirrelMail 1.0.4 and earlier do not properly initialize certain PHP variables, which allows remote attackers to (1) view sensitive files via the config_php and data_dir options, and (2) execute arbitrary code by using options_order.php to upload a message that could be interpreted as PHP.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2002-03-15T05:00:00

Updated: 2002-03-22T10:00:00

Reserved: 2002-03-15T00:00:00


Link: CVE-2001-1159

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2001-07-02T04:00:00.000

Modified: 2008-09-05T20:25:50.237


Link: CVE-2001-1159

JSON object: View

cve-icon Redhat Information

No data.