CVE-2016-1212

Published on: 06/04/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

Certain versions of Mp Form Mail Cgi from Futomi contain the following vulnerability:

Directory traversal vulnerability in futomi MP Form Mail CGI Professional Edition 3.2.3 and earlier allows remote authenticated administrators to read arbitrary files via unspecified vectors.

  • CVE-2016-1212 has been assigned by [email protected] to track the vulnerability - currently rated as LOW severity.

CVSS3 Score: 2.7 - LOW

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW HIGH NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED LOW NONE NONE

CVSS2 Score: 4 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
MP Form Mail CGI Professional 版をご利用の方へバージョンアップのお願い - futomi's CGI Cafe Vendor Advisory
www.futomi.com
text/html
URL Logo CONFIRM www.futomi.com/library/info/2016/201605.html
No Description Provided Vendor Advisory
jvndb.jvn.jp
text/html
URL Logo JVNDB JVNDB-2016-000069
JVN#42545812: MP Form Mail CGI Professional Edition vulnerable to directory traversal Vendor Advisory
jvn.jp
text/xml
URL Logo JVN JVN#42545812

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationFutomiMp Form Mail CgiAllAllAllAll
  • cpe:2.3:a:futomi:mp_form_mail_cgi:*:*:*:*:professional:*:*:*: