5
CVSSv2

CVE-2006-5210

Published: 16/10/2006 Updated: 17/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in IronWebMail prior to 6.1.1 HotFix-17 allows remote malicious users to read arbitrary files via a GET request to the IM_FILE identifier with double-url-encoded "../" sequences ("%252e%252e/").

Vulnerable Product Search on Vulmon Subscribe to Product

ciphertrust ironmail 4.1

ciphertrust ironmail 4.5.1

ciphertrust ironmail 5.0.1

ciphertrust ironmail

Exploits

source: wwwsecurityfocuscom/bid/20436/info IronWebMail is prone to a remote information-disclosure vulnerability because the application fails to properly sanitize user-supplied input Exploiting this issue allows remote, unauthenticated attackers to retrieve the contents of arbitrary files from vulnerable computers with the privileges o ...