5
CVSSv2

CVE-2005-3811

Published: 25/11/2005 Updated: 11/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Directory traversal vulnerability in admin/main.php in AMAX Magic Winmail Server 4.2 (build 0824) and previous versions allows remote malicious users to overwrite arbitrary files with session information via the sid parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

amax information technologies magic winmail server

Exploits

<?php /* WinMail Server 44 build 1124 (WebMail) remote add new Super User exploit * by rgod * * software site: wwwmagicwinmailnet/downloadasp * * * vulnerable code in /inc/classsessionphp at lines 8-25: * * function Load() { * $result = Array(); * * $sessionfile = $this->temp_folder"_sessions/"$this- ...