Lucene search

K

mailgear-1.0.txt

🗓️ 29 Nov 1999 00:00:00Reported by Underground Security Systems ResearchType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 59 Views

Vulnerability in Symantec Mail-Gear 1.0 allows directory traversal and unauthorized file access.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Symantec Mail-Gear 1.0 Web interface Server Directory Traversal  
Vulnerability  
  
  
PROBLEM  
  
UssrLabs found a Symantec Mail-Gear 1.0 Web interface Server Directory  
Traversal Vulnerability  
Using the string '../' in a URL, an attacker can gain read access to  
any file outside of the intended web-published filesystem directory  
  
There is not much to expand on this one....  
  
Example:  
  
http://ServerIp:8003/Display?what=../../../../../autoexec.bat to show  
autoexec.bat  
  
  
Vendor Status:  
Contacted  
  
Vendor Url: http://www.symantec.com/urlabs/public/index.html  
Program Url: http://www.symantec.com/urlabs/public/download/download.html  
  
Credit: USSRLABS  
  
SOLUTION  
Upgrade to Symantec Mail-Gear 1.1  
  
u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h  
http://www.ussrback.com  
  
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
29 Nov 1999 00:00Current
7.4High risk
Vulners AI Score7.4
59
.json
Report