CRLF injection vulnerability in mime.php in @Mail WebMail Client in AtMail Open-Source before 1.05 allows remote attackers to conduct directory traversal attacks and read arbitrary files via a %0A sequence followed by a .. (dot dot) in the file parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://en.securitylab.ru/lab/PT-2011-48 | |
http://atmail.org/download/atmailopen.tgz | patch |
http://www.kb.cert.org/vuls/id/743555 | third party advisory us government resource |
http://secunia.com/advisories/47012 | third party advisory |