An information exposure vulnerability has been found, the exploitation of which could allow a remote user to retrieve sensitive information stored on the server such as credential files, configuration files, application files, etc., simply by appending any of the following parameters to the end of the URL: %00 %0a, %20, %2a, %a0, %aa, %c0 and %ca.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-bvrp-software-slmail | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
29 Nov 2023, 21:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:seattlelab:slmail:5.5.0.4433:*:*:*:*:*:*:* |
|
First Time |
Microsoft windows
Seattlelab Seattlelab slmail Microsoft |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-bvrp-software-slmailĀ - Third Party Advisory |
23 Nov 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-23 13:15
Updated : 2023-11-29 21:23
NVD link : CVE-2023-4595
Mitre link : CVE-2023-4595
JSON object : View
Products Affected
seattlelab
- slmail
microsoft
- windows
CWE
CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory