CVE-2005-1754

** DISPUTED ** JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache_tomcat:apache_tomcat:5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:sun:javamail:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:sun:javamail:1.2:*:*:*:*:*:*:*
cpe:2.3:a:sun:javamail:1.3:*:*:*:*:*:*:*
cpe:2.3:a:sun:javamail:1.3.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:58

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=111697083812367&w=2 - () http://marc.info/?l=bugtraq&m=111697083812367&w=2 -
References () http://tomcat.apache.org/security-5.html - () http://tomcat.apache.org/security-5.html -
References () http://www.securityfocus.com/bid/13753 - Exploit () http://www.securityfocus.com/bid/13753 - Exploit

Information

Published : 2005-12-31 05:00

Updated : 2025-04-03 01:03


NVD link : CVE-2005-1754

Mitre link : CVE-2005-1754

CVE.ORG link : CVE-2005-1754


JSON object : View

Products Affected

sun

  • javamail

apache_tomcat

  • apache_tomcat
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor