Path traversal vulnerability whose exploitation could allow an authenticated remote user to bypass SecurityManager's intended restrictions and list a parent directory via any filename, such as a multiple ..%2F value affecting the 'dodoc' parameter in the /MailAdmin_dll.htm file.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-54446 | Path traversal vulnerability whose exploitation could allow an authenticated remote user to bypass SecurityManager's intended restrictions and list a parent directory via any filename, such as a multiple ..%2F value affecting the 'dodoc' parameter in the /MailAdmin_dll.htm file. |
Fixes
Solution
There is no reported solution at the moment.
Workaround
No workaround given by the vendor.
References
History
Tue, 01 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-10-01T14:49:56.728Z
Reserved: 2023-08-29T08:30:22.264Z
Link: CVE-2023-4593
Updated: 2024-08-02T07:31:06.611Z
Status : Modified
Published: 2023-11-23T13:15:11.810
Modified: 2024-11-21T08:35:30.280
Link: CVE-2023-4593
No data.
OpenCVE Enrichment
No data.
EUVD