{ "schema_version": "1.4.0", "id": "GHSA-qmxf-cchc-q3mc", "modified": "2022-05-02T03:24:32Z", "published": "2022-05-02T03:24:32Z", "aliases": [ "CVE-2009-1381" ], "details": "The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.19-1 on Debian GNU/Linux, and possibly other operating systems and versions, allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program. NOTE: this issue exists because of an incomplete fix for CVE-2009-1579.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1381" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2009-1381" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502137" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01195.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01202.html" }, { "type": "WEB", "url": "http://release.debian.org/proposed-updates/stable_diffs/squirrelmail_1.4.15-4+lenny2.debdiff" }, { "type": "WEB", "url": "http://secunia.com/advisories/35140" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1802" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:122" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/503718/100/0/threaded" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-05-22T20:30:00Z" } }