[] NeoSense

MDaemon 8.0 - Content Filter Directory Traversal

Author: Tan Chew Keong
type: remote
platform: windows
port: 
date_added: 2005-07-27 
date_updated: 2013-06-09 
verified: 1 
codes: OSVDB-18348 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/14400/info

MDaemon server is prone to a directory traversal vulnerability due to improper sanitization of user input.

Failure to sanitize the filename and path may result in compromise of the file system outside of the application's quarantine directory.

The following email attachment filename example was provided:

'../../../../../file.exe'