Absolute path traversal vulnerability in the FTP server in MicroWorld eScan Corporate Edition 9.0.742.98 and eScan Management Console (aka eScan Server) 9.0.742.1 allows remote attackers to read arbitrary files via an absolute pathname in the RETR (get) command.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/escaz-adv.txt - Exploit | |
References | () http://secunia.com/advisories/29246 - Exploit, Vendor Advisory | |
References | () http://securityreason.com/securityalert/3723 - | |
References | () http://www.securityfocus.com/archive/1/489228/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/28127 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41033 - |
Information
Published : 2008-03-10 17:44
Updated : 2024-11-21 00:43
NVD link : CVE-2008-1221
Mitre link : CVE-2008-1221
CVE.ORG link : CVE-2008-1221
JSON object : View
Products Affected
microworld_technologies
- escan
- escan_management_console
- escan_server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')