Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Directory Traversal and Cross-Site Scripting Vulnerabilities - exploit.company
header-logo
Suggest Exploit
vendor:
1st Class Mail Server
by:
Unknown
7.5
CVSS
HIGH
Directory Traversal and Cross-Site Scripting
Unknown
CWE
Product Name: 1st Class Mail Server
Affected Version From: 1st Class Mail Server version 4.01
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: a:1st_class_mail_server:1st_class_mail_server:4.01
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Directory Traversal and Cross-Site Scripting Vulnerabilities

Multiple vulnerabilities have been identified in the application that may allow a remote attacker to carry out directory traversal and cross-site scripting attacks. The specific vulnerability exists in the 1st Class Mail Server version 4.01. However, other versions may also be affected. An attacker can exploit these vulnerabilities by sending a specially crafted request to the affected server, allowing them to traverse directories and execute arbitrary scripts in the context of a victim's browser.

Mitigation:

No specific mitigation or remediation information provided
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10089/info
     
Multiple vulnerabilities have been identified in the application that may allow a remote attacker to carry out directory traversal and cross-site scripting attacks.
     
1st Class Mail Server version 4.01 is reported to be prone to these issues, however, it is possible that other versions are affected as well. 

http://www.example.com/AUTH=[some_value]/user/list.tagz?Site=www.example.com&Mailbox=[html_code]