Vulnerability Description
emumail.cgi in EMU Webmail 5.0 allows remote attackers to determine the full pathname for emumail.cgi via a malformed string containing script, which generates a regular expression matching error that includes the pathname in the resulting error message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emumail | Emu Webmail | 5.0 |
References
- http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0131.htmlExploitPatchVendor Advisory
- http://www.iss.net/security_center/static/10204.phpVendor Advisory
- http://www.iss.net/security_center/static/10205.php
- http://www.securityfocus.com/bid/5823ExploitVendor Advisory
- http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0131.htmlExploitPatchVendor Advisory
- http://www.iss.net/security_center/static/10204.phpVendor Advisory
- http://www.iss.net/security_center/static/10205.php
- http://www.securityfocus.com/bid/5823ExploitVendor Advisory
FAQ
What is CVE-2002-1527?
CVE-2002-1527 is a vulnerability with a CVSS score of 5.0 (MEDIUM). emumail.cgi in EMU Webmail 5.0 allows remote attackers to determine the full pathname for emumail.cgi via a malformed string containing script, which generates a regular expression matching error that...
How severe is CVE-2002-1527?
CVE-2002-1527 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-1527?
Check the references section above for vendor advisories and patch information. Affected products include: Emumail Emu Webmail.