Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://securitytracker.com/id?1014047 - | |
References | () http://www.idefense.com/application/poi/display?id=242&type=vulnerabilities - Vendor Advisory | |
References | () http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html - Patch | |
References | () http://www.securityfocus.com/bid/13727 - |
Information
Published : 2005-05-25 04:00
Updated : 2024-11-20 23:56
NVD link : CVE-2005-1252
Mitre link : CVE-2005-1252
CVE.ORG link : CVE-2005-1252
JSON object : View
Products Affected
ipswitch
- imail_server
- imail
CWE