Vulnerability Description
JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache Tomcat | Apache Tomcat | 5.0.16 |
| Sun | Javamail | 1.1.3 |
Related Weaknesses (CWE)
References
- http://marc.info/?l=bugtraq&m=111697083812367&w=2
- http://tomcat.apache.org/security-5.html
- http://www.securityfocus.com/bid/13753Exploit
- http://marc.info/?l=bugtraq&m=111697083812367&w=2
- http://tomcat.apache.org/security-5.html
- http://www.securityfocus.com/bid/13753Exploit
FAQ
What is CVE-2005-1754?
CVE-2005-1754 is a vulnerability with a CVSS score of 5.0 (MEDIUM). JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache di...
How severe is CVE-2005-1754?
CVE-2005-1754 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-1754?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomcat Apache Tomcat, Sun Javamail.