Web Based Administration in MicroWorld Technologies MailScan 5.6.a espatch 1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to determine the installation path, IP addresses, and error messages via direct requests to files under LOG/.
References
Configurations
History
21 Nov 2024, 00:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=121881329424635&w=2 - Exploit | |
References | () http://secunia.com/advisories/31534 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/4172 - | |
References | () http://www.oliverkarow.de/research/mailscan.txt - Exploit | |
References | () http://www.securityfocus.com/bid/30700 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44518 - |
Information
Published : 2008-08-20 16:41
Updated : 2024-11-21 00:49
NVD link : CVE-2008-3728
Mitre link : CVE-2008-3728
CVE.ORG link : CVE-2008-3728
JSON object : View
Products Affected
microworld_technologies
- mailscan
CWE
CWE-264
Permissions, Privileges, and Access Controls