9 lines
No EOL
388 B
Text
9 lines
No EOL
388 B
Text
source: https://www.securityfocus.com/bid/14400/info
|
|
|
|
MDaemon server is prone to a directory traversal vulnerability due to improper sanitization of user input.
|
|
|
|
Failure to sanitize the filename and path may result in compromise of the file system outside of the application's quarantine directory.
|
|
|
|
The following email attachment filename example was provided:
|
|
|
|
'../../../../../file.exe' |