CVE-2007-6348
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
14/12/2007
Last modified:
09/04/2025
Description
SquirrelMail 1.4.11 and 1.4.12, as distributed on sourceforge.net before 20071213, has been externally modified to create a Trojan Horse that introduces a PHP remote file inclusion vulnerability, which allows remote attackers to execute arbitrary code.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.12:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=119765643909825&w=2
- http://marc.info/?l=squirrelmail-devel&m=119756462212214&w=2
- http://marc.info/?l=squirrelmail-devel&m=119765235203392&w=2
- http://osvdb.org/42633
- http://secunia.com/advisories/28095
- http://www.securityfocus.com/archive/1/485037/100/0/threaded
- http://www.squirrelmail.org/index.php
- http://marc.info/?l=bugtraq&m=119765643909825&w=2
- http://marc.info/?l=squirrelmail-devel&m=119756462212214&w=2
- http://marc.info/?l=squirrelmail-devel&m=119765235203392&w=2
- http://osvdb.org/42633
- http://secunia.com/advisories/28095
- http://www.securityfocus.com/archive/1/485037/100/0/threaded
- http://www.squirrelmail.org/index.php



