CVE-2002-0490

Instant Web Mail before 0.60 does not properly filter CR/LF sequences, which allows remote attackers to (1) execute arbitrary POP commands via the id parameter in message.php, or (2) modify certain mail message headers via numerous parameters in write.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:instant_web_mail:instant_web_mail:0.55:*:*:*:*:*:*:*
cpe:2.3:a:instant_web_mail:instant_web_mail:0.56:*:*:*:*:*:*:*
cpe:2.3:a:instant_web_mail:instant_web_mail:0.57:*:*:*:*:*:*:*
cpe:2.3:a:instant_web_mail:instant_web_mail:0.58:*:*:*:*:*:*:*
cpe:2.3:a:instant_web_mail:instant_web_mail:0.59:*:*:*:*:*:*:*

History

20 Nov 2024, 23:39

Type Values Removed Values Added
References () http://instantwebmail.sourceforge.net/#changeLog - () http://instantwebmail.sourceforge.net/#changeLog -
References () http://www.iss.net/security_center/static/8650.php - Patch, Vendor Advisory () http://www.iss.net/security_center/static/8650.php - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/264041 - Vendor Advisory () http://www.securityfocus.com/archive/1/264041 - Vendor Advisory
References () http://www.securityfocus.com/bid/4361 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/4361 - Patch, Vendor Advisory

Information

Published : 2002-08-12 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2002-0490

Mitre link : CVE-2002-0490

CVE.ORG link : CVE-2002-0490


JSON object : View

Products Affected

instant_web_mail

  • instant_web_mail