Vulnerability Name: | CVE-2001-1458 (CCN-7287) | ||||||||
Assigned: | 2001-10-15 | ||||||||
Published: | 2001-10-15 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote attackers to read arbitrary files via a request for /servlet/webacc?User.html= that contains "../" (dot dot) sequences and a null character. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: MITRE Type: CNA CVE-2001-1458 Source: BUGTRAQ Type: UNKNOWN 20011015 Novell Groupwise arbitrary file retrieval vulnerability Source: CCN Type: Novell Technical Information Document 2960443 GroupWise 6 WebAccess Security Fix Source: CONFIRM Type: UNKNOWN http://support.novell.com/servlet/tidfinder/2960443 Source: MISC Type: Exploit http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/advisories_template.htm%3Findexid%3D12 Source: CCN Type: Foundstone Security Advisory FS-101501-20-GWSE Novell Groupwise arbitrary file retrieval vulnerability Source: CCN Type: US-CERT VU#341539 Novell GroupWise Server web-based front-end does not adequately validate user input thereby allowing directory traversal Source: CERT-VN Type: US Government Resource VU#341539 Source: CONFIRM Type: UNKNOWN http://www.novell.com/coolsolutions/gwmag/features/a_webaccess_security_gw.html Source: CCN Type: OSVDB ID: 17110 Novell GroupWise webacc User.html Parameter Traversal Arbitrary File Access Source: BID Type: UNKNOWN 3436 Source: CCN Type: BID-3436 Novell Groupwise Arbitrary File Retrieval Vulnerability Source: XF Type: UNKNOWN novell-groupwise-directory-traversal(7287) Source: XF Type: UNKNOWN novell-groupwise-directory-traversal(7287) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |