Description
Path traversal vulnerability whose exploitation could allow an authenticated remote user to bypass SecurityManager's intended restrictions and list a parent directory via any filename, such as a multiple ..%2F value affecting the 'dodoc' parameter in the /MailAdmin_dll.htm file.
Published: 2023-11-23
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

There is no reported solution at the moment.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-54446 Path traversal vulnerability whose exploitation could allow an authenticated remote user to bypass SecurityManager's intended restrictions and list a parent directory via any filename, such as a multiple ..%2F value affecting the 'dodoc' parameter in the /MailAdmin_dll.htm file.
History

Tue, 01 Oct 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Microsoft Windows
Seattlelab Slmail
cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2024-10-01T14:49:56.728Z

Reserved: 2023-08-29T08:30:22.264Z

Link: CVE-2023-4593

cve-icon Vulnrichment

Updated: 2024-08-02T07:31:06.611Z

cve-icon NVD

Status : Modified

Published: 2023-11-23T13:15:11.810

Modified: 2024-11-21T08:35:30.280

Link: CVE-2023-4593

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses