Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9m75-wm4c-393v

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via ".." (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.

Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via ".." (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.

EPSS

Процентиль: 55%
0.0033
Низкий

Связанные уязвимости

nvd
больше 20 лет назад

Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.

EPSS

Процентиль: 55%
0.0033
Низкий