exploit-db-mirror/platforms/multiple/remote/25395.txt
Offensive Security 5e2fc10125 DB: 2016-09-03
2016-09-03 13:13:25 +00:00

7 lines
No EOL
373 B
Text
Executable file

source: http://www.securityfocus.com/bid/13141/info
Sun JavaMail is prone to a directory traversal vulnerability. This arises because the API fails to properly validate filenames in email attachments received by the applet.
This issue was reported to affect JavaMail 1.3.2, however, earlier versions may also be vulnerable.
Content-Disposition: ../../../file.ext