Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-1252 | First vendor Publication | 2005-05-25 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1252 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
16805 | Ipswitch IMail Web Calendaring Server GET Request Traversal Arbitrary File Ac... The Web Calendaring component in IMail Server contains a flaw that allows a remote attacker to access arbitrary files. The issue occurs when requesting nonexistent JavaScript (*.jsp) files followed by traversal style attacks (../../) resulting in a loss of confidentiality. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Ipswitch IMail Calendaring arbitrary file read attempt RuleID : 15953 - Revision : 9 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-05-25 | Name : The remote web server is prone to a directory traversal attack. File : ipswitch_imail_webcalendar_dir.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:08 |
|
2024-11-28 12:06:59 |
|
2021-05-04 12:02:55 |
|
2021-04-22 01:03:09 |
|
2020-05-23 01:36:37 |
|
2020-05-23 00:16:30 |
|
2014-02-17 10:31:06 |
|
2014-01-19 21:22:40 |
|
2013-05-11 11:24:43 |
|