CVE-2005-1252
Summary
| CVE | CVE-2005-1252 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-05-25 04:00:00 UTC |
| Updated | 2008-11-15 05:46:00 UTC |
| Description | Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Ipswitch, Inc. - IMail Server Patches & Upgrades | CONFIRM | www.ipswitch.com | Patch |
| Advisory: 05.24.05 // VeriSign iDefense | IDEFENSE | www.idefense.com | Vendor Advisory |
| Ipswitch IMail Server Multiple Vulnerabilities | BID | www.securityfocus.com | |
| SecurityTracker.com Archives - IPswitch IMail Bugs Let Remote Users View Files and Execute Arbitrary Code | SECTRACK | securitytracker.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.