ID CVE-2005-1252
Summary Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.
References
Vulnerable Configurations
  • cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*
  • cpe:2.3:a:ipswitch:imail_server:8.2:hotfix2:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:imail_server:8.2:hotfix2:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 15-11-2008 - 05:46)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 13727
confirm http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html
idefense 20050524 Ipswitch IMail Web Calendaring Arbitrary File Read Vulnerability
sectrack 1014047
saint via4
  • bid 13727
    description IMail IMAP STATUS buffer overflow
    id mail_imap_imail
    osvdb 16806
    title imail_imap_status
    type remote
  • bid 13727
    description IMail IMAP LOGIN special character vulnerability
    id mail_imap_imail
    osvdb 16804
    title imail_imap_login_specialchar
    type remote
Last major update 15-11-2008 - 05:46
Published 25-05-2005 - 04:00
Last modified 15-11-2008 - 05:46
Back to Top