vendor:
Uebimiau
by:
Blake
7,5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: Uebimiau
Affected Version From: 3.2.0
Affected Version To: 2.0
Patch Exists: N/A
Related CWE: N/A
CPE: a:t-dahmail:uebimiau
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2010
Uebimiau Webmail Local File Inclusion
The stage parameter is not properly sanitized, allowing an attacker to read arbitrary files on the server.
Mitigation:
Input validation should be used to prevent the inclusion of arbitrary files.