File: 100000142.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (62 lines) | stat: -rw-r--r-- 1,165 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
Rule:

--
Sid:
100000142

--
Summary:
This event is generated when an attempt is made to exploit a
directory traversal associated with Imail Web Calendaring
servicel

--
Impact:
A successful attack can permit a user to navigate outside
of the web root directory and read files.

--
Detailed Information:
The Imail Web Calendaring Server does not properly sanitize
a malformed URL that contains directory traversal characters.
This vulnerability is associated with static objects identified
by names ending in .jsp, .jpg, .gif, .wav, .css, or .htm.  This
can permit an unauthorized user to examine files that may contain
sensitive information.

--
Affected Systems:
Ipswitch IMail Server 8.2 and prior
Ipswitch IMail Server 8.15 and prior

--
Attack Scenarios:
An attacker send a URI containing a directory traversal to view
sensitive files on a vulnerable server.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the most current non-affected version of the product.

--
Contributors:
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References
Other:

--