Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2011-0049 First vendor Publication 2011-02-03
Vendor Cve Last vendor Modification 2024-02-14

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0049

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 30

ExploitDB Exploits

id Description
2011-02-03 Majordomo2 - Directory Traversal (SMTP/HTTP)

OpenVAS Exploits

Date Description
2011-02-07 Name : Majordomo2 Directory Traversal Vulnerability
File : nvt/gb_majordomo2_dir_trav_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
71087 Majordomo2 lib/Majordomo.pm _list_file_get() Traversal Arbitrary File Access

Majordomo 2 contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the '_list_file_get()' function, lib/Majordomo.pm, not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) when handling files. This directory traversal attack would allow the attacker to access arbitrary files.

Snort® IPS/IDS

Date Description
2014-01-10 Majordomo2 smtp directory traversal attempt
RuleID : 18765 - Revision : 7 - Type : SERVER-MAIL
2014-01-10 Majordomo2 http directory traversal attempt
RuleID : 18761 - Revision : 6 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2011-02-16 Name : The remote web server hosts a web application that contains a directory trave...
File : majordomo2_dir_traversal.nasl - Type : ACT_ATTACK

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/46127
BUGTRAQ http://www.securityfocus.com/archive/1/516150/100/0/threaded
CERT-VN http://www.kb.cert.org/vuls/id/363726
EXPLOIT-DB http://www.exploit-db.com/exploits/16103
MISC https://bug628064.bugzilla.mozilla.org/attachment.cgi?id=506481
https://bugzilla.mozilla.org/show_bug.cgi?id=628064
https://sitewat.ch/en/Advisory/View/1
OSVDB http://osvdb.org/70762
SECTRACK http://www.securitytracker.com/id?1025024
SECUNIA http://secunia.com/advisories/43125
SREASON http://securityreason.com/securityalert/8061
VUPEN http://www.vupen.com/english/advisories/2011/0288
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/65113

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2024-02-14 13:28:21
  • Multiple Updates
2021-05-05 01:07:58
  • Multiple Updates
2021-05-04 12:13:44
  • Multiple Updates
2021-04-22 01:14:53
  • Multiple Updates
2020-05-23 01:43:36
  • Multiple Updates
2020-05-23 00:27:30
  • Multiple Updates
2018-10-11 00:20:02
  • Multiple Updates
2017-08-17 09:23:13
  • Multiple Updates
2016-06-28 18:28:58
  • Multiple Updates
2016-04-26 20:27:07
  • Multiple Updates
2014-02-17 10:59:19
  • Multiple Updates
2014-01-19 21:27:21
  • Multiple Updates
2013-07-25 21:20:45
  • Multiple Updates
2013-05-10 22:51:56
  • Multiple Updates