Directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface.
References
Configurations
Configuration 1 (hide)
|
History
14 Feb 2024, 01:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://sitewat.ch/en/Advisory/View/1 - Exploit, URL Repurposed |
Information
Published : 2011-02-04 01:00
Updated : 2024-02-14 01:17
NVD link : CVE-2011-0049
Mitre link : CVE-2011-0049
CVE.ORG link : CVE-2011-0049
JSON object : View
Products Affected
mj2
- majordomo_2
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
