CVE-2008-3728

Web Based Administration in MicroWorld Technologies MailScan 5.6.a espatch 1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to determine the installation path, IP addresses, and error messages via direct requests to files under LOG/.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microworld_technologies:mailscan:5.6.a:*:*:*:*:*:*:*

History

21 Nov 2024, 00:49

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=121881329424635&w=2 - Exploit () http://marc.info/?l=bugtraq&m=121881329424635&w=2 - Exploit
References () http://secunia.com/advisories/31534 - Vendor Advisory () http://secunia.com/advisories/31534 - Vendor Advisory
References () http://securityreason.com/securityalert/4172 - () http://securityreason.com/securityalert/4172 -
References () http://www.oliverkarow.de/research/mailscan.txt - Exploit () http://www.oliverkarow.de/research/mailscan.txt - Exploit
References () http://www.securityfocus.com/bid/30700 - Exploit () http://www.securityfocus.com/bid/30700 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44518 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/44518 -

Information

Published : 2008-08-20 16:41

Updated : 2024-11-21 00:49


NVD link : CVE-2008-3728

Mitre link : CVE-2008-3728

CVE.ORG link : CVE-2008-3728


JSON object : View

Products Affected

microworld_technologies

  • mailscan
CWE
CWE-264

Permissions, Privileges, and Access Controls