[原文]PHP remote file inclusion vulnerability in includes/mailaccess/pop3.php in V-Webmail 1.5 through 1.6.4 allows remote attackers to execute arbitrary PHP code via a URL in the CONFIG[pear_dir] parameter.
Script: V-Webmail 1.6.4
Description: V-webmail is a powerful PHP based webmail application with an
abundance of features, including many innovative ideas for web applications
Discovered: beford <xbefordx gmail com>
v-webmail/includes/pear/*/*.php => require_once ($CONFIG['pear_dir'] . '*.php');
require_once($CONFIG['pear_dir'] . 'Net/POP3.php');
Version 1.5 - 1.6.4
# milw0rm.com [2006-05-25]
V-webmail contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to the 'pop3.php' script not properly sanitizing user input supplied to the 'CONFIG[pear_dir]' parameter. This may allow an attacker to include a file from a third-party remote host that contains commands or code that will be executed by the vulnerable script with the same privileges as the web server.
OSVDB is not aware of a solution for this vulnerability.