Show plain JSON{"id": "CVE-2006-5210", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2006-10-16T23:07:00.000", "references": [{"url": "http://secunia.com/advisories/22406", "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/1726", "source": "cve@mitre.org"}, {"url": "http://securitytracker.com/id?1017069", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/448779/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/20436", "tags": ["Exploit", "Patch"], "source": "cve@mitre.org"}, {"url": "http://www.symantec.com/enterprise/research/SYMSA-2006-010.txt", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2006/4055", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29620", "source": "cve@mitre.org"}, {"url": "https://supportcenter.ciphertrust.com/vulnerability/IWM501-01.html", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/22406", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/1726", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securitytracker.com/id?1017069", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/448779/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/20436", "tags": ["Exploit", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.symantec.com/enterprise/research/SYMSA-2006-010.txt", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2006/4055", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29620", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://supportcenter.ciphertrust.com/vulnerability/IWM501-01.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in IronWebMail before 6.1.1 HotFix-17 allows remote attackers to read arbitrary files via a GET request to the IM_FILE identifier with double-url-encoded \"../\" sequences (\"%252e%252e/\")."}, {"lang": "es", "value": "Vulnerabilidad de atravesamiento de directorios en IronWebMail anterior a 6.1.1 HotFix-17 permite a atacantes remotos leer archivos de su elecci\u00f3n mediante una petici\u00f3n GET al identificador IM_FILE con secuencias \"../\" doblemente codificadas como url (\"%252e%252e/\")."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ciphertrust:ironmail:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B7E39CC-F610-4397-9C88-2C9B08DFA99D", "versionEndIncluding": "6.1.1"}, {"criteria": "cpe:2.3:a:ciphertrust:ironmail:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "645369C8-159C-459E-9067-2D46EE7A3E5E"}, {"criteria": "cpe:2.3:a:ciphertrust:ironmail:4.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BD16815-8709-4F64-966F-BA8FBDAC377A"}, {"criteria": "cpe:2.3:a:ciphertrust:ironmail:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CCD2698-A7A2-44BC-A352-B7CA89AD3032"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org", "evaluatorSolution": "This vulnerability is addressed in the following product update:\r\nCipherTrust, IronMail, 6.1.1 HotFix-17"}