First published: Thu Nov 23 2023(Updated: )
An information exposure vulnerability has been found, the exploitation of which could allow a remote user to retrieve sensitive information stored on the server such as credential files, configuration files, application files, etc., simply by appending any of the following parameters to the end of the URL: %00 %0a, %20, %2a, %a0, %aa, %c0 and %ca.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Seattlelab Slmail | =5.5.0.4433 | |
Microsoft Windows |
There is no reported solution at the moment.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4595 is a vulnerability that allows a remote user to retrieve sensitive information stored on the server.
CVE-2023-4595 works by allowing a remote user to append certain parameters to the end of a file or directory path, which then exposes sensitive information.
CVE-2023-4595 has a severity rating of 7.5, which is considered high.
The Seattlelab Slmail software version 5.5.0.4433 is affected by CVE-2023-4595.
To fix CVE-2023-4595, it is recommended to apply the latest security patches or updates provided by the software vendor.