Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-1252

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2005-1252
Last Modified 15 Nov 2008 12:46:11
Published 25 May 2005 12:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2005-1252

Summary

Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.

Vulnerable Systems

Application

  • Ipswitch Imail 8.13

  • Ipswitch Imail Server 8.2 Hotfix 2


References

CONFIRM - http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html

BID - 13727

IDEFENSE - 20050524 Ipswitch IMail Web Calendaring Arbitrary File Read Vulnerability

SECTRACK - 1014047


Last Updated: 27 May 2016 10:40:06