First published: Fri Sep 28 2012(Updated: )
Directory traversal vulnerability in the agent HTTP interfaces in Novell GroupWise 8.0 before Support Pack 3 and 2012 before Support Pack 1 allows remote attackers to read arbitrary files via directory traversal sequences in a request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus GroupWise | =8.0 | |
Micro Focus GroupWise | =8.00-hp1 | |
Micro Focus GroupWise | =8.00-hp2 | |
Micro Focus GroupWise | =8.00-hp3 | |
Micro Focus GroupWise | =8.01 | |
Micro Focus GroupWise | =8.01-hp | |
Micro Focus GroupWise | =8.02 | |
Micro Focus GroupWise | =8.02-hp1 | |
Micro Focus GroupWise | =8.02-hp2 | |
Micro Focus GroupWise | =8.02-hp3 | |
Micro Focus GroupWise | =2012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0419 is considered a medium severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2012-0419, update Novell GroupWise to version 8.0 Support Pack 3 or later, or to 2012 Support Pack 1 or later.
CVE-2012-0419 allows remote attackers to conduct directory traversal attacks to read arbitrary files on the server.
CVE-2012-0419 affects Novell GroupWise versions 8.0 before Support Pack 3 and 2012 before Support Pack 1.
The potential impacts of CVE-2012-0419 include unauthorized access to sensitive files, which could lead to data leakage.