CVE-2001-1045

Directory traversal vulnerability in basilix.php3 in Basilix Webmail 1.0.3beta and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the request_id[DUMMY] parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:basilix:basilix_webmail:1.02_beta:*:*:*:*:*:*:*
cpe:2.3:a:basilix:basilix_webmail:1.03_beta:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2001-07/0114.html - Exploit, Patch, Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2001-07/0114.html - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/2995 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/2995 - Exploit, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6873 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6873 -

Information

Published : 2001-07-06 04:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-1045

Mitre link : CVE-2001-1045

CVE.ORG link : CVE-2001-1045


JSON object : View

Products Affected

basilix

  • basilix_webmail