Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Majordomo 2 _list_file_get() directory traversal vulnerability
Informations
Name VU#363726 First vendor Publication 2011-02-04
Vendor VU-CERT Last vendor Modification 2011-03-28
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#363726

Majordomo 2 _list_file_get() directory traversal vulnerability

Overview

Majordomo 2 contains a directory traversal vulnerability in the _list_file_get()function, which may allow a remote, unauthenticated attacker to obtain sensitive information.

I. Description

Majordomo 2 contains a directory traversal vulnerability in the _list_file_get()function (lib/Majordomo.pm) caused by an input validation error when handling files. An attacker can exploit this vulnerability via directory traversal specifiers sent in a specially crafted request to any of the application's interfaces (e.g. email or web).

Additional information regarding this vulnerability can be found in this Sitewatch Advisory.

II. Impact

A remote unauthenticated attacker could obtain sensitive information.

III. Solution

Update

Majordomo 2 recommends users update to snapshot 20110204 or later.

Vendor Information


The vulnerability is reported in snapshots prior to 20110204.
VendorStatusDate NotifiedDate Updated
Majordomo 2Affected2011-02-04

References


http://www.us-cert.gov/current/index.html#majordomo_vulnerable_to_directory_traversal
https://sitewat.ch/en/Advisory/View/1
http://ftp.mj2.org/pub/mj2/snapshots/2011-02/

Credit

This vulnerability was reported by Michael Brooks.

This document was written by Michael Orlando.

Other Information

Date Public:2011-02-04
Date First Published:2011-02-04
Date Last Updated:2011-03-28
CERT Advisory: 
CVE-ID(s):CVE-2011-0049
NVD-ID(s):CVE-2011-0049
US-CERT Technical Alerts: 
Severity Metric:25.20
Document Revision:21

Original Source

Url : http://www.kb.cert.org/vuls/id/363726

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 30

ExploitDB Exploits

id Description
2011-02-03 Majordomo2 - Directory Traversal (SMTP/HTTP)

OpenVAS Exploits

Date Description
2011-02-07 Name : Majordomo2 Directory Traversal Vulnerability
File : nvt/gb_majordomo2_dir_trav_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
71087 Majordomo2 lib/Majordomo.pm _list_file_get() Traversal Arbitrary File Access

Majordomo 2 contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the '_list_file_get()' function, lib/Majordomo.pm, not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) when handling files. This directory traversal attack would allow the attacker to access arbitrary files.

Snort® IPS/IDS

Date Description
2014-01-10 Majordomo2 smtp directory traversal attempt
RuleID : 18765 - Revision : 7 - Type : SERVER-MAIL
2014-01-10 Majordomo2 http directory traversal attempt
RuleID : 18761 - Revision : 6 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2011-02-16 Name : The remote web server hosts a web application that contains a directory trave...
File : majordomo2_dir_traversal.nasl - Type : ACT_ATTACK

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:07:47
  • Multiple Updates