CVE-2006-0818
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/07/2006
Last modified:
03/04/2025
Description
Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558.
Impact
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:deerfield:visnetic_mail_server:8.3.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:icewarp:web_mail:5.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:merak:mail_server:8.3.8r:*:windows:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/18953
- http://secunia.com/advisories/18966
- http://secunia.com/secunia_research/2006-12/advisory/
- http://secunia.com/secunia_research/2006-14/advisory/
- http://securitytracker.com/id?1016513=
- http://securitytracker.com/id?1016514=
- http://www.securityfocus.com/archive/1/440297/100/0/threaded
- http://www.securityfocus.com/archive/1/440302/100/0/threaded
- http://www.securityfocus.com/bid/19002
- http://www.securityfocus.com/bid/19007
- http://www.vupen.com/english/advisories/2006/2825
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27780
- http://secunia.com/advisories/18953
- http://secunia.com/advisories/18966
- http://secunia.com/secunia_research/2006-12/advisory/
- http://secunia.com/secunia_research/2006-14/advisory/
- http://securitytracker.com/id?1016513=
- http://securitytracker.com/id?1016514=
- http://www.securityfocus.com/archive/1/440297/100/0/threaded
- http://www.securityfocus.com/archive/1/440302/100/0/threaded
- http://www.securityfocus.com/bid/19002
- http://www.securityfocus.com/bid/19007
- http://www.vupen.com/english/advisories/2006/2825
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27780