cve/2007/CVE-2007-3778.md
2024-05-26 14:27:05 +02:00

20 lines
932 B
Markdown

### [CVE-2007-3778](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3778)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The G/PGP (GPG) Plugin 2.0, and 2.1dev before 20060912, for Squirrelmail allows remote attackers to execute arbitrary commands via shell metacharacters in the messageSignedText parameter to the gpg_check_sign_pgp_mime function in gpg_hook_functions.php. NOTE: a parameter value can be set in the contents of an e-mail message.
### POC
#### Reference
- http://www.attrition.org/pipermail/vim/2007-July/001704.html
- http://www.attrition.org/pipermail/vim/2007-July/001710.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35363
#### Github
No PoCs found on GitHub currently.