CVE-2003-1426

Current Description

Openwebmail in cPanel 5.0, when run using suid Perl, adds the directory in the SCRIPT_FILENAME environment variable to Perl's @INC include array, which allows local users to execute arbitrary code by modifying SCRIPT_FILENAME to reference a directory containing a malicious openwebmail-shared.pl executable.

Basic Data

PublishedDecember 31, 2003
Last ModifiedJuly 29, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-16
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:N/C:P/I:P/A:N
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score3.3
SeverityLOW
Exploitability Score3.4
Impact Score4.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationCpanelCpanel5.0*******

Vulnerable Software List

VendorProductVersions
Cpanel Cpanel 5.0

References

NameSourceURLTags
20030218 Cpanel 5 and below remote command execution and local root vulnerabilitieshttp://archives.neohapsis.com/archives/vulnwatch/2003-q1/0087.htmlVULNWATCH
6885http://www.securityfocus.com/bid/6885BIDExploit
cpanel-scriptfilename-gain-privileges(11357)https://exchange.xforce.ibmcloud.com/vulnerabilities/11357XF