Korean
<< Back
VID 21260
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Mailreader.com contains a directory traversal vulnerability.
Mailreader.com, developed by Kim Holviala, is a freely available Web-based POP3 Webmail written in Perl. The version 2.3.31 and earlier of Mailreader.com can disclose the contents of arbitrary webserver file, caused by improper validation of user-supplied "configLanguage" parameter. To exploit this vulnerability, a remote attacker will send a "nph-mr.cgi" request containing "dot dot" sequences (/../) and a known file appended with a NULL byte character (%00) as the follow:

http://[targetserver]/cgi-bin/nph-mr.cgi?do=loginhelp&configLanguage=../../../../../../../etc/passwd%00

It can allow a remote attacker to view the requested file (password file).

* References:
http://marc.theaimsgroup.com/?l=bugtraq&m=103583018300931&w=2

* Platforms Affected:
Mailreader.com 2.3.31 and earlier
Linux Any version
Unix Any version
Windows Any version
Recommendation Upgrade to the latest version or 2.3.33 or later of Mailreader.com, available from the Mailreader.com Web site at http://www.mailreader.com/

Now the latest version, Mailreader.com version 2.3.35, is released on Mar. 4, 2003.
Related URL CVE-2002-1581 (CVE)
Related URL 6055 (SecurityFocus)
Related URL 10490 (ISS)