Unrated severityNVD Advisory· Published Jul 15, 2007· Updated Apr 23, 2026
CVE-2007-3778
CVE-2007-3778
Description
The G/PGP (GPG) Plugin 2.0, and 2.1dev before 20060912, for Squirrelmail allows remote attackers to execute arbitrary commands via shell metacharacters in the messageSignedText parameter to the gpg_check_sign_pgp_mime function in gpg_hook_functions.php. NOTE: a parameter value can be set in the contents of an e-mail message.
Affected products
2cpe:2.3:a:squirrelmail:gpg_plugin:2.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:squirrelmail:gpg_plugin:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:gpg_plugin:2.1_dev:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- labs.idefense.com/intelligence/vulnerabilities/display.phpnvdPatch
- secunia.com/advisories/26035nvdVendor Advisory
- lists.immunitysec.com/pipermail/dailydave/2007-July/004452.htmlnvd
- lists.immunitysec.com/pipermail/dailydave/2007-July/004456.htmlnvd
- osvdb.org/37931nvd
- www.attrition.org/pipermail/vim/2007-July/001704.htmlnvd
- www.attrition.org/pipermail/vim/2007-July/001710.htmlnvd
- www.securityfocus.com/bid/24874nvd
- www.vupen.com/english/advisories/2007/2513nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/35363nvd
News mentions
0No linked articles in our index yet.