#VU45230 Path traversal in Majordomo 2 - CVE-2011-0063

 

#VU45230 Path traversal in Majordomo 2 - CVE-2011-0063

Published: March 15, 2011 / Updated: August 11, 2020


Vulnerability identifier: #VU45230
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/U:Green
CVE-ID: CVE-2011-0063
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Majordomo 2
Software vendor:
mj2.org

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.


Remediation

Install update from vendor's website.

External links