Computer Security
[EN] securityvulns.ru no-pyccku


Majordomo2 directory traversal
updated since 03.02.2011
Published:10.03.2011
Source:
SecurityVulns ID:11397
Type:remote
Threat Level:
6/10
Description:Directory traversal on help command processing via e-mail or Web.
CVE:CVE-2011-0049 (Directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface.)
Original documentdocumentNSO Research, NSOADV-2011-003: Majordomo2 'help' Command Directory Traversal (Patch Bypass) (10.03.2011)
 documentmike_(at)_sitewat.ch, Majordomo2 - Directory Traversal (SMTP/HTTP) (03.02.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod