Loading
Generated remediation guidance and an executive summary. No account required.
openwebmail_init in Open WebMail 1.81 and earlier allows local users to execute arbitrary code via .. (dot dot) sequences in a login name, such as the name provided in the sessionid parameter for openwebmail-abook.pl, which is used to find a configuration file that specifies additional code to be executed.
Use Open Webmail vendor hub and Open Webmail product page to widen CVE-2002-1385 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2004-2284, CVE-2005-1435 and CVE-2006-2190 for nearby disclosures in the same product family.