CVE-2012-1917

compose.php in @Mail WebMail Client in AtMail Open-Source before 1.05 does not properly handle ../ (dot dot slash) sequences in the unique parameter, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ..././ (dot dot dot slash dot slash) sequence.
Configurations

Configuration 1 (hide)

cpe:2.3:a:atmail:atmail_open:*:*:open-source:*:*:*:*:*

History

21 Nov 2024, 01:38

Type Values Removed Values Added
References () http://atmail.org/download/atmailopen.tgz - Patch () http://atmail.org/download/atmailopen.tgz - Patch
References () http://en.securitylab.ru/lab/PT-2011-48 - () http://en.securitylab.ru/lab/PT-2011-48 -
References () http://secunia.com/advisories/47012 - () http://secunia.com/advisories/47012 -
References () http://www.kb.cert.org/vuls/id/743555 - US Government Resource () http://www.kb.cert.org/vuls/id/743555 - US Government Resource

Information

Published : 2012-03-27 19:55

Updated : 2024-11-21 01:38


NVD link : CVE-2012-1917

Mitre link : CVE-2012-1917

CVE.ORG link : CVE-2012-1917


JSON object : View

Products Affected

atmail

  • atmail_open
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')