cve/2005/CVE-2005-1924.md

19 lines
989 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2005-1924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1924)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The G/PGP (GPG) Plugin 2.1 and earlier for Squirrelmail allow remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the fpr parameter to the deleteKey function in gpg_keyring.php, as called by (a) import_key_file.php, (b) import_key_text.php, and (c) keyring_main.php; and (2) the keyserver parameter to the gpg_recv_key function in gpg_key_functions.php, as called by gpg_options.php. NOTE: this issue may overlap CVE-2007-3636.
### POC
#### Reference
- http://www.attrition.org/pipermail/vim/2007-July/001710.html
- https://www.exploit-db.com/exploits/4173
#### Github
No PoCs found on GitHub currently.