Basilix Webmail 0.9.7beta, and possibly other versions, stores *.class and *.inc files under the document root and does not restrict access, which could allows remote attackers to obtain sensitive information such as MySQL passwords and usernames from the mysql.class file.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/155897 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/2198 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5934 | |
http://www.securityfocus.com/archive/1/155897 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/2198 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5934 |
Configurations
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/155897 - Exploit, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/2198 - Exploit, Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/5934 - |
Information
Published : 2001-01-11 05:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-1044
Mitre link : CVE-2001-1044
CVE.ORG link : CVE-2001-1044
JSON object : View
Products Affected
basilix
- basilix_webmail
CWE