Vulnerability Description
MailEnable before 8.60 allows Directory Traversal for reading the messages of other users, uploading files, and deleting files because "/../" and "/.. /" are mishandled.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailenable | Mailenable | < 8.60 |
Related Weaknesses (CWE)
References
- https://web.archive.org/web/20150329173628/http://www.mailenable.com/Standard-ReRelease NotesVendor Advisory
- https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/201ExploitThird Party Advisory
- https://www.nccgroup.trust/uk/our-research/multiple-vulnerabilities-in-mailenablThird Party Advisory
- https://web.archive.org/web/20150329173628/http://www.mailenable.com/Standard-ReRelease NotesVendor Advisory
- https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/201ExploitThird Party Advisory
- https://www.nccgroup.trust/uk/our-research/multiple-vulnerabilities-in-mailenablThird Party Advisory
FAQ
What is CVE-2015-9277?
CVE-2015-9277 is a vulnerability with a CVSS score of 9.1 (CRITICAL). MailEnable before 8.60 allows Directory Traversal for reading the messages of other users, uploading files, and deleting files because "/../" and "/.. /" are mishandled.
How severe is CVE-2015-9277?
CVE-2015-9277 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2015-9277?
Check the references section above for vendor advisories and patch information. Affected products include: Mailenable Mailenable.