Lucene search

K
exploitdbRafael San Miguel CarrascoEDB-ID:25395
HistoryApr 12, 2005 - 12:00 a.m.

Sun JavaMail 1.3.2 - 'MimeBodyPart.getFileName' Directory Traversal

2005-04-1200:00:00
Rafael San Miguel Carrasco
www.exploit-db.com
19

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/13141/info

Sun JavaMail is prone to a directory traversal vulnerability. This arises because the API fails to properly validate filenames in email attachments received by the applet.

This issue was reported to affect JavaMail 1.3.2, however, earlier versions may also be vulnerable. 

Content-Disposition: ../../../file.ext 

AI Score

7.4

Confidence

Low

Related for EDB-ID:25395