Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.902591
Category:Web application abuses
Title:Hastymail < 2.1.1 RC2 RCE Vulnerability
Summary:Hastymail2 is prone to a remote code execution; vulnerability.
Description:Summary:
Hastymail2 is prone to a remote code execution
vulnerability.

Vulnerability Insight:
The flaw is due to improper validation of user-supplied input
via the 'rs' and 'rsargs[]' parameters to index.php (when 'page' is set to 'mailbox' and
'mailbox' is set to 'Drafts'), which allows attackers to execute arbitrary code in the context of
an affected site.

Vulnerability Impact:
Successful exploitation will allow remote attackers to inject
and execute arbitrary malicious code with the privileges of the user running the application.

Affected Software/OS:
Hastymail2 version 2.1.1 and prior.

Solution:
Update to version 2.1.1 RC2 or later.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-4542
https://www.dognaedis.com/vulns/DGS-SEC-3.html
http://secunia.com/advisories/48308
CopyrightCopyright (C) 2011 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.