Описание
send_message.php in AeroMail before 1.45 allows remote attackers to read arbitrary files on the server, instead of just uploaded files, via an attachment that modifies the filename to be uploaded.
Ссылки
- ExploitVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- ExploitVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:aeromail:aeromail:1.02:*:*:*:*:*:*:*
cpe:2.3:a:aeromail:aeromail:1.10:*:*:*:*:*:*:*
cpe:2.3:a:aeromail:aeromail:1.20:*:*:*:*:*:*:*
cpe:2.3:a:aeromail:aeromail:1.26:*:*:*:*:*:*:*
cpe:2.3:a:aeromail:aeromail:1.30:*:*:*:*:*:*:*
cpe:2.3:a:aeromail:aeromail:1.40:*:*:*:*:*:*:*
EPSS
Процентиль: 82%
0.01755
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
send_message.php in AeroMail before 1.45 allows remote attackers to read arbitrary files on the server, instead of just uploaded files, via an attachment that modifies the filename to be uploaded.
EPSS
Процентиль: 82%
0.01755
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other