Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/586556 | US Government Resource |
http://www.securityfocus.com/bid/56343 | |
http://www.kb.cert.org/vuls/id/586556 | US Government Resource |
http://www.securityfocus.com/bid/56343 |
Configurations
History
21 Nov 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/586556 - US Government Resource | |
References | () http://www.securityfocus.com/bid/56343 - |
Information
Published : 2012-10-31 19:55
Updated : 2024-11-21 01:43
NVD link : CVE-2012-4940
Mitre link : CVE-2012-4940
CVE.ORG link : CVE-2012-4940
JSON object : View
Products Affected
gecad
- axigen_free_mail_server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')