MDaemon 8.0 Content Filter Directory Traversal Vulnerability

2005-07-27T00:00:00
ID EDB-ID:26044
Type exploitdb
Reporter Tan Chew Keong
Modified 2005-07-27T00:00:00

Description

MDaemon 8.0 Content Filter Directory Traversal Vulnerability. Remote exploit for windows platform

                                        
                                            source: http://www.securityfocus.com/bid/14400/info

MDaemon server is prone to a directory traversal vulnerability due to improper sanitization of user input.

Failure to sanitize the filename and path may result in compromise of the file system outside of the application's quarantine directory. 

The following email attachment filename example was provided:

'../../../../../file.exe'