Ipswitch IMail Web Calendaring Server GET Request Traversal Arbitrary File Access

medium Nessus Plugin ID 18368

Synopsis

The remote web server is prone to a directory traversal attack.

Description

The remote server is running Ipswitch IMail Web calendaring.

The remote version of this software is vulnerable to a directory traversal attack. An attacker, exploiting this vulnerability, may be able to retrieve sensitive files present on the server.

Solution

Apply IMail Server 8.2 Hotfix 2 or later.

See Also

http://www.nessus.org/u?2721ee84

https://www.securityfocus.com/archive/1/400545

http://www.nessus.org/u?1d4dce96

Plugin Details

Severity: Medium

ID: 18368

File Name: ipswitch_imail_webcalendar_dir.nasl

Version: 1.22

Type: remote

Family: Web Servers

Published: 5/25/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:ipswitch:imail

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 5/24/2005

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2005-1252

BID: 13727