First published: Thu Nov 23 2023(Updated: )
Path traversal vulnerability whose exploitation could allow an authenticated remote user to bypass SecurityManager's intended restrictions and list a parent directory via any filename, such as a multiple ..%2F value affecting the 'dodoc' parameter in the /MailAdmin_dll.htm file.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Seattlelab Slmail | =5.5.0.4433 | |
Microsoft Windows |
There is no reported solution at the moment.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4593 is a path traversal vulnerability in BVRP Software SLmail that allows an authenticated remote user to bypass intended restrictions and list a parent directory via the 'dodoc' parameter in the /MailAdmin_dll.htm file.
CVE-2023-4593 affects Seattlelab Slmail version 5.5.0.4433, allowing authenticated remote users to exploit the path traversal vulnerability.
No, Microsoft Windows is not vulnerable to CVE-2023-4593.
CVE-2023-4593 has a severity score of 6.5, considered medium.
To fix CVE-2023-4593, it is recommended to update Seattlelab Slmail to a non-vulnerable version provided by the vendor.