CVE-2006-4955

Directory traversal vulnerability in the downloadfile servlet in Neon WebMail for Java before 5.08 allows remote attackers to read arbitrary files via a .. (dot dot) sequence in the (1) savefolder and (2) savefilename parameters.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:neosys:neon_webmail:5.06:*:java:*:*:*:*:*
cpe:2.3:a:neosys:neon_webmail:5.07:*:java:*:*:*:*:*

History

21 Nov 2024, 00:17

Type Values Removed Values Added
References () http://secunia.com/advisories/22029 - Patch, Vendor Advisory () http://secunia.com/advisories/22029 - Patch, Vendor Advisory
References () http://vuln.sg/neonmail506-en.html - Exploit, Patch () http://vuln.sg/neonmail506-en.html - Exploit, Patch
References () http://www.securityfocus.com/bid/20109 - Exploit, Patch () http://www.securityfocus.com/bid/20109 - Exploit, Patch
References () http://www.securityfocus.com/bid/84199 - () http://www.securityfocus.com/bid/84199 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29090 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29090 -

Information

Published : 2006-09-23 10:07

Updated : 2025-04-03 01:03


NVD link : CVE-2006-4955

Mitre link : CVE-2006-4955

CVE.ORG link : CVE-2006-4955


JSON object : View

Products Affected

neosys

  • neon_webmail