CVE-2005-1252

Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:56

Type Values Removed Values Added
References () http://securitytracker.com/id?1014047 - () http://securitytracker.com/id?1014047 -
References () http://www.idefense.com/application/poi/display?id=242&type=vulnerabilities - Vendor Advisory () http://www.idefense.com/application/poi/display?id=242&type=vulnerabilities - Vendor Advisory
References () http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html - Patch () http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html - Patch
References () http://www.securityfocus.com/bid/13727 - () http://www.securityfocus.com/bid/13727 -

Information

Published : 2005-05-25 04:00

Updated : 2024-11-20 23:56


NVD link : CVE-2005-1252

Mitre link : CVE-2005-1252

CVE.ORG link : CVE-2005-1252


JSON object : View

Products Affected

ipswitch

  • imail_server
  • imail