First published: Wed May 25 2005(Updated: )
Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IPSWITCH IMail | =8.13 | |
Ipswitch IMail Server | <=8.2_hotfix_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.