Summary
Detail | |||
---|---|---|---|
Vendor | mj2 | First view | 2011-02-03 |
Product | Majordomo 2 | Last view | 2011-03-15 |
Version | 20110121 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:mj2:majordomo_2 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5 | 2011-03-15 | CVE-2011-0063 | The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049. |
5 | 2011-02-03 | CVE-2011-0049 | Directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
71087 | Majordomo2 lib/Majordomo.pm _list_file_get() Traversal Arbitrary File Access |
ExploitDB Exploits
id | Description |
---|---|
16103 | Majordomo2 - Directory Traversal (SMTP/HTTP) |
OpenVAS Exploits
id | Description |
---|---|
2011-02-07 | Name : Majordomo2 Directory Traversal Vulnerability File : nvt/gb_majordomo2_dir_trav_vuln.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Majordomo2 smtp directory traversal attempt RuleID : 18765 - Type : SERVER-MAIL - Revision : 7 |
2014-01-10 | Majordomo2 http directory traversal attempt RuleID : 18761 - Type : SERVER-WEBAPP - Revision : 6 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2011-02-16 | Name: The remote web server hosts a web application that contains a directory trave... File: majordomo2_dir_traversal.nasl - Type: ACT_ATTACK |