Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote attackers to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://online.securityfocus.com/archive/1/220667 - | |
References | () http://support.novell.com/servlet/tidfinder/2960443 - | |
References | () http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/advisories_template.htm%3Findexid%3D12 - Exploit | |
References | () http://www.kb.cert.org/vuls/id/341539 - US Government Resource | |
References | () http://www.novell.com/coolsolutions/gwmag/features/a_webaccess_security_gw.html - | |
References | () http://www.securityfocus.com/bid/3436 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/7287 - |
Information
Published : 2001-10-15 04:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1458
Mitre link : CVE-2001-1458
CVE.ORG link : CVE-2001-1458
JSON object : View
Products Affected
novell
- groupwise
CWE