The (1) address.html and possibly (2) calendar.html pages in Merak Mail Server 5.2.7 allow remote attackers to gain sensitive information via an invalid HTTP request, which reveals the installation path. NOTE: it is unclear whether the calendar.html is an exposure, since the path is leaked in web logs that may only be available to the administrators, who would have access to the path through legitimate means.
References
Link | Resource |
---|---|
http://packetstormsecurity.nl/0408-exploits/merak527.txt | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/10966 | Exploit Patch Vendor Advisory |
http://www.osvdb.org/9043 | Exploit Patch Vendor Advisory |
http://secunia.com/advisories/12269 | Exploit Patch Vendor Advisory |
http://securitytracker.com/id?1010969 | |
http://marc.info/?l=bugtraq&m=109279057326044&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17027 |
Configurations
Information
Published : 2004-08-16 21:00
Updated : 2017-07-10 18:31
NVD link : CVE-2004-1720
Mitre link : CVE-2004-1720
JSON object : View
CWE
Products Affected
merak
- mail_server