Path traversal vulnerability whose exploitation could allow an authenticated remote user to bypass SecurityManager's intended restrictions and list a parent directory via any filename, such as a multiple ..%2F value affecting the 'dodoc' parameter in the /MailAdmin_dll.htm file.
History

Tue, 01 Oct 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published: 2023-11-23T12:31:38.141Z

Updated: 2024-10-01T14:49:56.728Z

Reserved: 2023-08-29T08:30:22.264Z

Link: CVE-2023-4593

cve-icon Vulnrichment

Updated: 2024-08-02T07:31:06.611Z

cve-icon NVD

Status : Modified

Published: 2023-11-23T13:15:11.810

Modified: 2024-11-21T08:35:30.280

Link: CVE-2023-4593

cve-icon Redhat

No data.