Web Based Administration in MicroWorld Technologies MailScan 5.6.a espatch 1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to determine the installation path, IP addresses, and error messages via direct requests to files under LOG/.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://securityreason.com/securityalert/4172 | third party advisory |
http://www.securityfocus.com/bid/30700 | vdb entry exploit |
http://secunia.com/advisories/31534 | third party advisory vendor advisory |
http://marc.info/?l=bugtraq&m=121881329424635&w=2 | mailing list exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44518 | vdb entry |
http://www.oliverkarow.de/research/mailscan.txt | exploit |