CVE-2005-1753
Published Dec 31, 2005
Last updated 3 months ago
Overview
- Description
- ReadMessage.jsp in JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to view other users' e-mail attachments via a direct request to /mailboxesdir/username@domainname. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products.
- Source
- cve@mitre.org
- NVD status
- Modified
- CNA Tags
- disputed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Vendor comments
- Red HatWe do not believe this is a security issue; this is a deliberate circumvention of the Javamail API. The Javamail API provides a comprehensive and secure method to retrieve mail. In this example, the author retreives the message directly from the mail directory on the filesystem. Even if the user insists on using this incorrect way of accessing mail, then the permissions set by the dovecot and tomcat packages are enough to protect against direct access to most of the files listed in the bug report.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:javamail:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04D05527-847C-4630-9667-F41DD78917DC" }, { "criteria": "cpe:2.3:a:sun:javamail:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "398E46A2-D9BF-4AF6-B068-A28233B76ECC" }, { "criteria": "cpe:2.3:a:sun:javamail:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EB65E60-8259-4C08-AC3B-7D3FE51F42F0" } ], "operator": "OR" } ] } ]