VID |
21777 |
Severity |
20 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Winmail Server is vulnerable to a path disclosure vulnerability in multiple scripts. Winmail Server is a commercial mail server including extensive security measures for Microsoft Windows platforms. Winmail Server version 4.0 (build 1112) and possibly other versions could allow a remote attacker to disclose certain system information. By sending a specially-crafted HTTP request to the admin/chgpwd.php, admin/domain.php, or admin/user.php script, a remote attacker could cause the affected server to return an error message containing the installation path.
* References: http://secunia.com/advisories/13438/ http://www.osvdb.org/displayvuln.php?osvdb_id=12336 http://www.osvdb.org/displayvuln.php?osvdb_id=12337 http://www.osvdb.org/displayvuln.php?osvdb_id=12338
* Platforms Affected: AMAX Information Technologies Inc., Winmail Server 4.0 (build 1112) and other versions Microsoft Windows Any version |
Recommendation |
Set "display_errors = Off" in the "winmail_php.ini" configuration file. |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
18427 (ISS) |
|