CVE-2005-1252
Published May 25, 2005
Last updated 16 years ago
Overview
- Description
- Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "443C3EE1-1C98-40F6-93DD-F60BD0C46C2F" }, { "criteria": "cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8FF3313-6C45-44C5-B093-E865AB16BAB9", "versionEndIncluding": "8.2_hotfix_2" } ], "operator": "OR" } ] } ]