- Description
- W3Mail 1.0.2 through 1.0.5 with server side scripting (SSI) enabled in the attachments directory does not properly restrict the types of files that can be uploaded as attachments, which allows remote attackers to execute arbitrary code by sending code in MIME attachments, then requesting the attachments.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 4.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:N
- nvd@nist.gov
- CWE-16
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cascadesoft:w3mail:1.0.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E1EE68E0-07A6-4BB1-9A1F-6D246E96A5CC"
},
{
"criteria": "cpe:2.3:a:cascadesoft:w3mail:1.0.3:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "14A85754-EFF2-4FAD-8C7C-E02A3FF175E6"
},
{
"criteria": "cpe:2.3:a:cascadesoft:w3mail:1.0.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "465507F2-7653-4712-8297-161782C866E0"
},
{
"criteria": "cpe:2.3:a:cascadesoft:w3mail:1.0.5:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2E471889-ACFE-45B7-A443-079999C65088"
}
],
"operator": "OR"
}
]
}
]