ID CVE-2004-2572
Summary AMAX Magic Winmail Server 3.6 allows remote attackers to obtain sensitive information by entering (1) invalid characters such as "()" or (2) a large number of characters in the Lookup field on the netaddressbook.php web form, which reveals the path in an ldaplib.php error message when the ldap_search function fails, due to improper processing of the $keyword variable.
References
Vulnerable Configurations
  • cpe:2.3:a:amax_information_technologies:magic_winmail_server:3.6:*:*:*:*:*:*:*
    cpe:2.3:a:amax_information_technologies:magic_winmail_server:3.6:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 11-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 9786
confirm http://www.magicwinmail.net/download/english-help.chm
misc http://members.lycos.co.uk/r34ct/main/ldaplib/ldaplib.php%20reveal%20local%20path%20of%20Winmail%203.6%20webmail%20directory.txt
osvdb 4118
secunia 11015
xf magic-winmail-path-disclosure(15361)
Last major update 11-07-2017 - 01:32
Published 31-12-2004 - 05:00
Last modified 11-07-2017 - 01:32
Back to Top