CVE-2008-6840

Christof Bruyland V-webmail - Code Injection

Title source: rule
STIX 2.1

Description

Multiple PHP remote file inclusion vulnerabilities in V-webmail 1.6.4 allow remote attackers to execute arbitrary PHP code via a URL in the (1) CONFIG[pear_dir] parameter to (a) Mail/RFC822.php, (b) Net/Socket.php, (c) XML/Parser.php, (d) XML/Tree.php, (e) Mail/mimeDecode.php, (f) Console/Getopt.php, (g) System.php, (h) Log.php, and (i) File.php in includes/pear/; the CONFIG[pear_dir] parameter to (j) includes/prepend.php, and (k) includes/cachedConfig.php; and the (2) CONFIG[includes] parameter to (l) prepend.php and (m) email.list.search.php in includes/. NOTE: the CONFIG[pear_dir] parameter to includes/mailaccess/pop3.php is already covered by CVE-2006-2666.

Exploits (13)

exploitdb WRITEUP VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32033
exploitdb WRITEUP VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32035
exploitdb WRITEUP VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32027
exploitdb WRITEUP VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32026
exploitdb WRITEUP VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32030
exploitdb WRITEUP VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32025
exploitdb WRITEUP VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32024
exploitdb WORKING POC VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32028
exploitdb WRITEUP VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32031
exploitdb WRITEUP VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32032
exploitdb WORKING POC VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32029
exploitdb WORKING POC VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32036
exploitdb WRITEUP VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/32034

References (3)

Core 3
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/30162
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/46680

Scores

EPSS 0.0107
EPSS Percentile 77.8%

Details

CWE
CWE-94
Status published
Products (1)
christof_bruyland/v-webmail 1.6.4
Published Jul 01, 2009
Tracked Since Feb 18, 2026