Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-1101 | First vendor Publication | 2005-01-10 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.8 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash), leak sensitive pathname information in the resulting error message, and execute a cross-site scripting (XSS) attack via an HTTP request that contains a / (backslash) and arbitrary webscript before the requested file, which leaks the pathname and does not quote the script in the resulting Visual Basic error message. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1101 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
11413 | MailPost mailpost.exe Path Disclosure MailPost contains a flaw that may lead to an unauthorized information disclosure. The issue is due to the 'mailpost.exe' script not properly sanitizing user-supplied input. By adding a trailing slash to a requested filename, the error page will disclose the installation path resulting in a loss of confidentiality. |
11412 | MailPost mailpost.exe append Parameter XSS MailPost contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'append' variables upon submission to the 'mailpost.exe' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-11-04 | Name : A web application running on the remote host has a cross-site scripting vulne... File : mailpost_multiple_flaws.nasl - Type : ACT_ATTACK |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:35 |
|
2024-11-28 12:06:17 |
|
2021-05-04 12:02:28 |
|
2021-04-22 01:02:37 |
|
2020-05-23 00:15:57 |
|
2017-07-11 12:01:33 |
|
2014-02-17 10:28:26 |
|
2013-05-11 11:43:50 |
|