First published: Thu Feb 09 2006(Updated: )
Directory traversal vulnerability in compose.pl in @Mail 4.3 and earlier for Windows allows remote attackers to upload arbitrary files to arbitrary locations via a .. (dot dot) in the unique parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phlymail | =4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0611 has a medium severity rating due to its potential for file upload vulnerabilities.
To fix CVE-2006-0611, upgrade to a version of @Mail later than 4.3 that has patched the directory traversal vulnerability.
The risks associated with CVE-2006-0611 include unauthorized file uploads which could lead to remote code execution or data breaches.
CVE-2006-0611 specifically affects @Mail version 4.3 and earlier for Windows.
Remote attackers can exploit CVE-2006-0611 by manipulating the unique parameter to perform directory traversal.