Vulnerabilities > CVE-2005-1252 - Unspecified vulnerability in Ipswitch Imail and Imail Server
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN ipswitch
nessus
Summary
Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family | Web Servers |
NASL id | IPSWITCH_IMAIL_WEBCALENDAR_DIR.NASL |
description | The remote server is running Ipswitch IMail Web calendaring. The remote version of this software is vulnerable to a directory traversal attack. An attacker, exploiting this vulnerability, may be able to retrieve sensitive files present on the server. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18368 |
published | 2005-05-25 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18368 |
title | Ipswitch IMail Web Calendaring Server GET Request Traversal Arbitrary File Access |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/39313/05.24.05-4.txt |
id | PACKETSTORM:39313 |
last seen | 2016-12-05 |
published | 2005-08-14 |
reporter | iDefense Labs |
source | https://packetstormsecurity.com/files/39313/iDEFENSE-Security-Advisory-2005-05-24.4.html |
title | iDEFENSE Security Advisory 2005-05-24.4 |
Saint
bid 13727 description IMail IMAP STATUS buffer overflow id mail_imap_imail osvdb 16806 title imail_imap_status type remote bid 13727 description IMail IMAP LOGIN special character vulnerability id mail_imap_imail osvdb 16804 title imail_imap_login_specialchar type remote
References
- http://securitytracker.com/id?1014047
- http://securitytracker.com/id?1014047
- http://www.idefense.com/application/poi/display?id=242&type=vulnerabilities
- http://www.idefense.com/application/poi/display?id=242&type=vulnerabilities
- http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html
- http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html
- http://www.securityfocus.com/bid/13727
- http://www.securityfocus.com/bid/13727